Protect your smartphone from radio-based attacks

By now, most of us are aware that smartphones are powerful computers and should be treated as such. It’s not a coincidence that most of the security tips given to smartphone users – such as refraining from opening suspicious links or downloading untrus… Continue reading Protect your smartphone from radio-based attacks

Radio frequency: An invisible espionage threat to enterprises

You can’t see it, but corporate airspaces are under attack via radio frequencies. Foreign governments, competitors and cyber criminals are all conducting radio-based attacks on enterprises. These sophisticated attacks use compromised RF devices as thei… Continue reading Radio frequency: An invisible espionage threat to enterprises

Emergency alert systems used across the US can be easily hijacked

A vulnerability affecting emergency alert systems supplied by ATI Systems, one of the leading suppliers of warning sirens in the USA, could be exploited remotely via radio frequencies to activate all the sirens and trigger false alarms. “We first… Continue reading Emergency alert systems used across the US can be easily hijacked

Icarus takes control of drones by impersonating their operators

Researcher Jonathan Andersson, a member of Trend Micro’s TippingPoint DVLabs, has demonstrated how a specialized hardware module dubbed Icarus can be used to hijack a variety of widely-used hobbyist drones and make them do your bidding. Why are such tools necessary As any technology, flying drones could be put to good use or can be misused to enable crimes and endanger the public and/or individuals. Terror attacks via drones, smuggling contraband into prisons, spying on … More Continue reading Icarus takes control of drones by impersonating their operators

Cheap radio attack can be used to unlock and steal 24 car models

A group of researchers from ADAC, the largest automobile club in Germany and Europe, have demonstrated how the keyless “comfort locking” system used by most automakers on most modern cars provides no security against vehicle theft. This finding, in itself, is not new, as previous research demonstrated how easy is to fool the system into unlocking the car and starting its engine by relaying messages between the car and the smart key, at a considerable … More Continue reading Cheap radio attack can be used to unlock and steal 24 car models