Tag: wifi
-
Breach Roundup: React Flaw Incites Supply Chain Risk
Also, Microsoft Badly Patches LNK Flaw, Australian Sentenced for ‘Evil Twin’ Hack. This week, the React flaw, a belated Windows fix, Defense Secretary Pete Hegseth’s Signal group posed operational risk, more North Korean npm packages. An Australian jailed for Wi-Fi evil twin crimes. The US FTC will send $15.3 million to Avast users. A London…
-
ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts”, and 15 More Stories
Think your Wi-Fi is safe? Your coding tools? Or even your favorite financial apps? This week proves again how hackers, companies, and governments are all locked in a nonstop race to outsmart each other.Here’s a quick rundown of the latest cyber stories that show how fast the game keeps changing. DeFi exploit drains funds Critical…
-
Arkanix Stealer Emerges as New Threat: Steals VPN Logins, Wi-Fi Credentials, and Screenshots
A newly discovered information-stealing malware called Arkanix is rapidly evolving to target sensitive user data, including VPN credentials, system information, and wireless network passwords. Security researchers have identified this emerging threat as a short-lived, profit-driven malware designed for quick financial exploitation through the sale of stolen data and direct credential compromise. The threat actors behind…
-
Man Sentenced After Running Fake Airport and In-Flight Wi-Fi Networks
A man who ran fake airport and in-flight Wi-Fi networks to steal traveler credentials has been sentenced to over seven years in prison. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/threats/man-sentenced-after-running-fake-airport-and-in-flight-wi-fi-networks/
-
Australian man jailed for 7+ years over airport and in-flight Wi-Fi attacks
Australian Michael Clapsis got 7 years and 4 months in prison for Wi-Fi attacks at airports and on flights, stealing sensitive data. Australian man Michael Clapsis (44) was sentenced to 7 years and 4 months in prison for conducting Wi-Fi attacks at airports and on flights, stealing sensitive information, according to the Australian Federal Police…
-
Australian Man Jailed for Running Fake Wi-Fi Attacks at Airports and Onboard Flights
A Perth man has been sent to jail for stealing private videos from women and creating a fake Wi-Fi network to trick airline passengers. The 44-year-old’s crimes have shocked the aviation industry and left many victims feeling violated. The Fake Wi-Fi Scheme The trouble started in April 2024 when workers at Qantas spotted something suspicious.…
-
Australian Man Jailed for Running Fake Wi-Fi Attacks at Airports and Onboard Flights
A Perth man has been sent to jail for stealing private videos from women and creating a fake Wi-Fi network to trick airline passengers. The 44-year-old’s crimes have shocked the aviation industry and left many victims feeling violated. The Fake Wi-Fi Scheme The trouble started in April 2024 when workers at Qantas spotted something suspicious.…
-
Australian Man Gets Seven Years for Running “Evil Twin” Wi-Fi
A Western Australia man will spend seven years behind bars after stealing intimate data via Wi-Fi First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/australian-man-seven-years-evil/
-
Man behind in-flight Evil Twin WiFi attacks gets 7 years in prison
A 44-year-old man was sentenced to seven years and four months in prison for operating an “evil twin” WiFi network to steal the data of unsuspecting travelers at various airports across Australia. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/man-behind-in-flight-evil-twin-wifi-attacks-gets-7-years-in-prison/
-
NDSS 2025 Deanonymizing Device Identities Via Side-Channel Attacks In Exclusive-Use IoTs
Tags: attack, authentication, conference, data, data-breach, exploit, flaw, identity, Internet, iot, leak, mitigation, network, privacy, side-channel, strategy, threat, vulnerability, wifiSession4A: IoT Security Authors, Creators & Presenters: Christopher Ellis (The Ohio State University), Yue Zhang (Drexel University), Mohit Kumar Jangid (The Ohio State University), Shixuan Zhao (The Ohio State University), Zhiqiang Lin (The Ohio State University) PAPER Deanonymizing Device Identities via Side-channel Attacks in Exclusive-use IoTs & Mitigation Wireless technologies like Bluetooth Low Energy (BLE)…
-
Tenda N300 Flaws Allow Attackers to Run Commands as Root
High command injection vulnerabilities have been discovered in Tenda’s N300 Wi-Fi 4G LTE Router and the 4G03 Pro model, allowing authenticated attackers to execute arbitrary commands with root privileges on affected devices. With no patches currently available from the manufacturer, security experts are urging users to consider alternative solutions to protect their networks from potential…
-
Tenda N300 Flaws Allow Attackers to Run Commands as Root
High command injection vulnerabilities have been discovered in Tenda’s N300 Wi-Fi 4G LTE Router and the 4G03 Pro model, allowing authenticated attackers to execute arbitrary commands with root privileges on affected devices. With no patches currently available from the manufacturer, security experts are urging users to consider alternative solutions to protect their networks from potential…
-
Tenda N300 Flaws Allow Attackers to Run Commands as Root
High command injection vulnerabilities have been discovered in Tenda’s N300 Wi-Fi 4G LTE Router and the 4G03 Pro model, allowing authenticated attackers to execute arbitrary commands with root privileges on affected devices. With no patches currently available from the manufacturer, security experts are urging users to consider alternative solutions to protect their networks from potential…
-
NDSS 2025 Spatial-Domain Wireless Jamming With Reconfigurable Intelligent Surfaces
Tags: attack, control, data, infrastructure, Internet, network, service, technology, threat, vulnerability, wifiSESSION Session 3B: Wireless, Cellular & Satellite Security ———– ———– Authors, Creators & Presenters: Philipp Mackensen (Ruhr University Bochum), Paul Staat (Max Planck Institute for Security and Privacy), Stefan Roth (Ruhr University Bochum), Aydin Sezgin (Ruhr University Bochum), Christof Paar (Max Planck Institute for Security and Privacy), Veelasha Moonsamy (Ruhr University Bochum) ———– PAPER ———–…
-
Wi-Fi Beamforming Tech Can Identify Individuals by Gait
Pedestrians Uniquely Refract Directional Radio Signals. The way you use your walk – specifically when striding through a Wi-Fi field shaped by directional antennae – can reveal who you are, found researchers who investigated the surveillance potential of wireless routers. Every router is a potential surveillance device, say researchers. First seen on govinfosecurity.com Jump to…
-
Europe to decide if 6 GHz is shared between Wi-Fi and cellular networks
Two different groups want this valuable spectrum, but can they share? First seen on theregister.com Jump to article: www.theregister.com/2025/11/09/europe_to_decide_if_6/
-
Europe to decide if 6 GHz is shared between Wi-Fi and cellular networks
Two different groups want this valuable spectrum, but can they share? First seen on theregister.com Jump to article: www.theregister.com/2025/11/09/europe_to_decide_if_6/
-
Wi-Fi signals may hold the key to touchless access control
Imagine walking into a secure building where the door unlocks the moment your hand hovers near it. No keycards, no PINs, no fingerprints. Instead, the system identifies you by … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/11/10/research-wi-fi-palm-authentication/
-
Wi-Fi signals may hold the key to touchless access control
Imagine walking into a secure building where the door unlocks the moment your hand hovers near it. No keycards, no PINs, no fingerprints. Instead, the system identifies you by … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/11/10/research-wi-fi-palm-authentication/
-
Wi-Fi signals may hold the key to touchless access control
Imagine walking into a secure building where the door unlocks the moment your hand hovers near it. No keycards, no PINs, no fingerprints. Instead, the system identifies you by … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/11/10/research-wi-fi-palm-authentication/
-
NDSS 2025 CHAOS: Exploiting Station Time Synchronization in 802.11 Networks
Session 1A: WiFi and Bluetooth Security Authors, Creators & Presenters: Sirus Shahini (University of Utah), Robert Ricci (University of Utah) PAPER CHAOS: Exploiting Station Time Synchronization in 802.11 Networks Many locations, especially in urban areas, are quite noisy with WiFi traffic. In addition to data traffic, WiFi stations send management and control frames that can…
-
NDSS 2025 CHAOS: Exploiting Station Time Synchronization in 802.11 Networks
Session 1A: WiFi and Bluetooth Security Authors, Creators & Presenters: Sirus Shahini (University of Utah), Robert Ricci (University of Utah) PAPER CHAOS: Exploiting Station Time Synchronization in 802.11 Networks Many locations, especially in urban areas, are quite noisy with WiFi traffic. In addition to data traffic, WiFi stations send management and control frames that can…
-
Review: The Wireless Cookbook
The Wireless Cookbook is a project-centered guide to working with Wi-Fi, Bluetooth, and LoRa, written with the Raspberry Pi as the main platform. It is aimed at people who … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/10/28/review-the-wireless-cookbook/
-
Review: The Wireless Cookbook
The Wireless Cookbook is a project-centered guide to working with Wi-Fi, Bluetooth, and LoRa, written with the Raspberry Pi as the main platform. It is aimed at people who … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/10/28/review-the-wireless-cookbook/
-
NDSS 2025 Lend Me Your Beam: Privacy Implications Of Plaintext Beamforming Feedback In WiFi Session 1A: WiFi and Bluetooth Security
Session 1A: WiFi and Bluetooth Security Authors, Creators & Presenters: Rui Xiao (Zhejiang University), Xiankai Chen (Zhejiang University), Yinghui He (Nanyang Technological University), Jun Han (KAIST), Jinsong Han (Zhejiang University) PAPER Lend Me Your Beam: Privacy Implications of Plaintext Beamforming Feedback in WiFi Our thanks to the Network and Distributed System Security (NDSS) Symposium for…
-
Microsoft Adds WiBased Work Location Auto-Detection to Teams
Microsoft is preparing to introduce a groundbreaking feature in Teams that will revolutionise how hybrid workers manage their presence information. The new capability will automatically identify and update users’ work locations by detecting their connection to organisational Wi-Fi networks, eliminating the need for manual status updates. Scheduled for deployment in December 2025, this opt-in functionality…
-
NDSS 2025 CHAOS: Exploiting Station Time Synchronization In 802.11 Networks Session 1A: WiFi and Bluetooth Security
Authors, Creators & Presenters: Sirus Shahini (University of Utah), Robert Ricci (University of Utah) PAPER – CHAOS: Exploiting Station Time Synchronization in 802.11 Networks Many locations, especially in urban areas, are quite noisy with WiFi traffic. In addition to data traffic, WiFi stations send management and control frames that can easily exceed several hundred frames…
-
NDSS 2025 Off-Path TCP Hijacking In Wi-Fi Networks: A Packet-Size Side Channel Attack
SESSION Session 1A: WiFi and Bluetooth Security PAPER Off-Path TCP Hijacking in Wi-Fi Networks: A Packet-Size Side Channel Attack In this paper, we unveil a fundamental side channel in Wi-Fi networks, specifically the observable frame size, which can be exploited by attackers to conduct TCP hijacking attacks. Authors, Creators & Presenters: Ziqiang Wang (Southeast University),…
-
DTTS – Zero Trust DNS Enforcement: Policy Violation Management
In a default-deny world, where only verified sources and verified destinations are allowed, which require a successful policy-allowed DNS resolution, many modern threats are mitigated, and there’s demonstrable value in choosing this path, including being able to enforce “My network, my rules” approach to egress control. However, in this world where existing applications need to…

