Nearest Neighbor: a remote attack on Wi-Fi networks
We discuss the recently discovered Nearest Neighbor attack method, which enables attackers to compromise a Wi-Fi network from the other side of the world.
62 articles
We discuss the recently discovered Nearest Neighbor attack method, which enables attackers to compromise a Wi-Fi network from the other side of the world.
A vulnerability in Kia’s web portal made it possible to hack cars and track their owners. All you needed was the car’s VIN number or just its license plate number.
A breakdown of the most high-profile data leaks ever: from Yahoo to RockYou2024.
Researchers have discovered several potential attack vectors targeting bicycles fitted with Shimano Di2 wireless gear-shifting system.
Almost six out of ten passwords can be cracked in less than an hour using either a modern graphics card or cloud services. All it costs is a few dollars and some free time. How this is possible and what to do about it is the topic of our study.
Dropbox has shared a report on a data breach in the Dropbox Sign e-signature service. What does this mean for users, and what should they do?
What’s the easiest way to hack a WPA2-protected wireless network? Using PMKID interception. Here’s how it works, and what you can do to protect yourself.
A researcher has discovered a vulnerability in the Bluetooth protocol implementations for Android, macOS, iOS, and Linux, allowing devices to be hacked remotely.
How Kaspersky products provide multi-layered financial protection, and what threats it can protect you from.
What personal information do modern cars collect about you, and how can you avoid surveillance or hacking of your vehicle?
How online services should store user passwords, and how to minimize the damage in the event of a leak or hack.
We explain what OSINT is, why it has to be front-of-mind at all times, and how to guard against hackers using it.
How social engineering helped hack the CIA chief, hijack Elon Musk and Joe Biden’s Twitter accounts, and steal half-a-billion dollars.
Smart feeders were invented to make life easier for pet owners; however, their vulnerabilities threaten not only owners’ privacy, but also the health of their pets.
Hundreds of millions of dollars stolen: the five biggest heists in cryptocurrency history.
At RSA Conference 2021, researchers talked about how they managed to turn a Comcast Xfinity remote into a listening device.
What to do if you receive a notification about a suspicious login to your Facebook or Instagram account.
Use these Origin settings to protect your EA account from hijacking, data theft, and spam.
Our experts tried to hack six smart gadgets for cars to find out how manufacturers protect customers.