Tag : wifi

iStock_000005754112Small

Top-Selling WiFi DSL Modems Routing Hackers Your Way

Apr 24, 2014 By Sharon Solomon | WiFi DSL routers have become a staple part of all professional computing setups. Unfortunately, wireless communication also introduces numerous vulnerabilities. A massive backdoor was found in popular NetGear, Linksys/Cisco and SerComm WiFi DSL modems back in December 2013. Security patches released by the companies have not solved the problem. More than 20 popular models sold worldwide have been found to possess the vulnerability. Once remotely in control of the router via a compromised port, the hacker can gain “root shell” access and send malicious commands to the device. Thousands of customers were expecting to mitigate the problem with the patch, but the desired result was not achieved. Owners of the vulnerable routers will have to adopt a pro-active approach to safeguard their networks since the backdoor still exists.

</Read More>
iStock_000036603448Small1

Internet of Fails: Serious Vulnerability Found in Philips Smart TVs

Apr 02, 2014 By Sharon Solomon | Just a couple of decades ago, the Internet of Things (IoT) idea was restricted to sci-fi movies and novels. But the internet revolution has changed everything. Millions of new home appliances are going online on a daily basis, enabling hackers to spread malware, create botnets and harvest sensitive information worldwide.  

</Read More>
iStock_000019668000Small

Mobile Friday: Ten Commandments of Android Safety

Mar 21, 2014 By Sharon Solomon | The Android mobile platform has come a long way since its introduction in 2008. Almost 80% of smartphones activated last year (2013) were powered by the “green robot”. But the customizable interface and other open source advantages come at a price. Android is ridden with vulnerabilities.
Android’s biggest convenience is also its biggest security issue. These smartphones are activated with one centralized Google ID, which controls all major functions such as emails, app management and calendar syncing. The risk is high. Besides this inherited problem, the open-source nature of the market-leading OS is prone to cybercrime. Pirated ROMs and unauthorized apps that can be downloaded from underground markets put the unsuspecting users in danger.

</Read More>
iStock_000007079321Small

Coming Soon: Chameleon, A WiFi Virus That Spreads Like Flu

Mar 03, 2014 By Sharon Solomon | The diversity in malware and virus attributes is huge. New techniques are being invented all the time. Just a few months ago Hacking with Inaudible Sounds was demonstrated. Now there is Chameleon, a contagious virus that skips in between Wireless Access Points. Researchers at the University of Liverpool in the UK conducted a unique research trying to infect Wireless Access Points. This revolutionary virus can potentially spread without the hacker’s intervention just like the common cold spreads between humans.

</Read More>
iStock_000016399323XSmall

Top 3 Android Security Tips

Jan 02, 2014 By Sharon Solomon | Android  is enjoying an exponential growth. It’s estimated that Android Smartphone shipments exceeded the 1 billion mark in 2013. But this open-source platform has numerous security issues. Users are advised to step up their security awareness. The Android mobile platform made its entry into the smartphone market in late 2008. Despite lagging behind iOS and Windows Mobile for a couple of years, it is now the leading platform worldwide (over 80% market share in Q3 of 2013). Frequently changing passwords, using Android in-built security features and installing anti-virus programs are very useful and always recommended. But for extensive protection you can and should do more. Lets take a closer look.

</Read More>
iStock_000026630984XSmall

Free Wi-Fi Hotspots – A Risky Luxury

Dec 04, 2013 By Sharon Solomon | The wireless revolution has turned internet access into a basic necessity. Social media networking and entertainment on-the-go are in high demand. In this reality, Wi-Fi hotspots are seen as blessings, even when the signal is coming from an unknown source. But this is a huge security risk that people rarely take into consideration.

</Read More>
iStock_000025113752XSmall-225x300

Top-10 Essential Challenges of Mobile Security

Nov 29, 2013 By Sharon Solomon | Mobile Security has become a crucial aspect of protecting sensitive data and information. Malicious attacks once focused on PC’s have now shifted to mobile phones and applications. Mobile makers are aware of this fact and are investing heavily in security.

</Read More>

Stay Connected

Sign up today & never miss an update from the Checkmarx blog

Follow us on Feedly

Interested in trying CxSAST on your own code? You can now use Checkmarx's solution to scan uncompiled / unbuilt source code in 18 coding and scripting languages and identify the vulnerable lines of code. CxSAST will even find the best-fix locations for you and suggest the best remediation techniques. Sign up for your FREE trial now.

Checkmarx is now offering you the opportunity to see how CxSAST identifies application-layer vulnerabilities in real-time. Our in-house security experts will run the scan and demonstrate how the solution's queries can be tweaked as per your specific needs and requirements. Fill in your details and we'll schedule a FREE live demo with you.