Israeli hacker group takes responsibility for reported collapse of Wi-Fi in Iran

The Israeli hacker group, “We Red Evils Original”, took responsibility for reported WiFi outages in Iran, according to Israeli media on Thursday night. Shortly before reports in Iran, the group posted a message on their Telegram saying, ‘In the coming Read More …

The Proliferation of Cellular in IoT

Analysis of Cellular Based Internet of Things (IoT) Technology is a new whitepaper co-authored by Rapid7 principal security researcher Deral Heiland and Thermo Fisher Scientific lead product security researcher Carlota Bindner. In this new research, the authors dive deep into Read More …

Personal data stolen from unsuspecting airport visitors and plane passengers in “evil twin” attacks

The Australian Federal Police (AFP) have charged a man for setting up fake free WiFi access points in order to steal personal data from people. The crime was discovered when an airline reported a suspicious WiFi network identified by its Read More …

China’s top anti-espionage authority warns of secret leaks through smart wearable devices

China’s top anti-espionage authority warned on Friday that various smart wearable devices may become “cyber spies” used by foreign intelligence agencies to carry out espionage activities, posing a threat to national security. The Ministry of State Security (MSS) said on Read More …

UT Dallas joins national effort to respond to cyber attacks on public infrastructure

UT Dallas last week announced it’s joining a nationwide collaboration to research how to make network-connected infrastructure — including self-driving cars, drones and Wi-Fi-connected trains — more resilient to cyber attacks. The Richardson-based university joins eight others selected for the Read More …

Operation Triangulation: iOS devices targeted with previously unknown malware

While monitoring its own corporate Wi-Fi network dedicated for mobile devices using the Kaspersky Unified Monitoring and Analysis Platform (KUMA), Kaspersky researchers noticed suspicious activity that originated from several iOS-based phones. Since it is impossible to inspect modern iOS devices Read More …

The voting machine hacking threat you probably haven’t heard about

There’s a largely overlooked hacking target that could help those who want to sow doubt about vote tallies in the November midterms: cellular modems that transmit unofficial election-night results. The modems, which send vote data from precincts to central offices Read More …

How Wi-Fi spy drones snooped on financial firm

Modified off-the-shelf drones have been found carrying wireless network-intrusion kit in a very unlikely place. The idea of using consumer-oriented drones for hacking has been explored over the past decade at security conferences like Black Hat 2016, in both the Read More …