Digital License Plates Are Here, But Do We Need Them?

It’s a story as old as time: you need to swap between your custom license plates, but you can’t find a screwdriver and you’re already running late for a big meeting at the Business Factory. You called AAA to see if they could come out and do it for you, but as luck would have it something must be wrong with your phone because the line was disconnected as soon as you explained the situation. As if life in the First World couldn’t get any more difficult.

Luckily, a company called Reviver Auto has come up with a thoroughly modern …read more

Continue reading Digital License Plates Are Here, But Do We Need Them?

Particle Paves Way For LTE Selfies

From cars to refrigerators, it seems as if every new piece of tech is connected to the Internet. For better or for worse, we’re deep into the “Internet of Things”. But what about your camera? No, not the camera in your smartphone; that one’s already connected to the Internet and selling your secrets to the highest bidder. Don’t you think your trusty DSLR could be improved by an infusion of Wide Area Networking?

Regardless of what you’re answer to that question might be, [Thomas Kittredge] decided his life would be improved by making his beloved Canon EOS Rebel T6 an …read more

Continue reading Particle Paves Way For LTE Selfies

Smartphone App Uses AR to Visualize The RF Spectrum

Have you ever wished you could see in the RF part of the radio spectrum? While such a skill would probably make it hard to get a good night’s rest, it would at least allow you to instantly see dead spots in your WiFi coverage. Not a bad tradeoff.

Unwilling to go full [Geordi La Forge] to be able to visualize RF, [Ken Kawamoto] built the next best thing – an augmented-reality RF signal strength app for his smartphone. Built to aid in the repositioning of his router in the post-holiday cleanup, the app uses the Android ARCore framework to …read more

Continue reading Smartphone App Uses AR to Visualize The RF Spectrum

New LTE attacks can reveal accessed websites, direct victims to malicious sites

Three new attacks against the LTE 4G wireless data communications technology have been pinpointed by researchers from Ruhr-University Bochum and New York University Abu Dhabi. All three target the technology’s data link layer protocols and impair… Continue reading New LTE attacks can reveal accessed websites, direct victims to malicious sites

4G is vulnerable to same types of attacks as 3G, researchers say

The 4G wireless telecommunications protocol is vulnerable to the same types of remote exploitation as its 3G predecessor, new research emphasizes. As with the flaw-ridden protocol underlying 3G, the 4G protocol is susceptible to attacks that disclose mobile users’ information or impose a denial of service, according to a report from mobile-security company Positive Technologies. Security researchers have long warned that spies or hackers could exploit the protocol supporting 3G — known as Signaling System No. 7 (SS7) — to intercept or track call data. The move from 3G to 4G, and the latter’s Diameter protocol, was supposed to mitigate some vulnerabilities, but security experts also have made clear that Diameter is no safeguard against hacking. While the new research indicates 4G is vulnerable to a smaller scope of attacks than 3G, it shows that attackers could shift a user’s device to 3G mode to exploit the less-secure SS7. Further, most mobile […]

The post 4G is vulnerable to same types of attacks as 3G, researchers say appeared first on Cyberscoop.

Continue reading 4G is vulnerable to same types of attacks as 3G, researchers say

LTE (4G) Communication Standard Can Be Hacked, Researchers Prove

A research that was just published reveals how attacks against the mobile communication standard LTE can occur. LTE can be compromised in three attacks where an attacker collects meta- information about the user’s traffic, among other things. Mor… Continue reading LTE (4G) Communication Standard Can Be Hacked, Researchers Prove

Hackers can Send Fake Emergency Alerts by Exploiting 4G LTE Protocol Flaws

By Waqas
Researchers at the Purdue University and the University of Iowa,
This is a post from HackRead.com Read the original post: Hackers can Send Fake Emergency Alerts by Exploiting 4G LTE Protocol Flaws
Continue reading Hackers can Send Fake Emergency Alerts by Exploiting 4G LTE Protocol Flaws

New LTE attacks open users to eavesdropping, fake messages, location spoofing

A group of researchers has uncovered ten new attacks against the 4G LTE wireless data communications technology for mobile devices and data terminals. The attacks exploit design flaws in the communications protocol and unsafe practices employed by the … Continue reading New LTE attacks open users to eavesdropping, fake messages, location spoofing