Poll finds that security concerns go out the window around free WiFi A survey of 1,195 internet users found that 82% of people state that they will connect to any available free WiFi that’s available in a public place. When they were asked about the security implications of such a decision, a shocking 71% of […]
In certain scenarios, iPhones leak phone numbers through Bluetooth Security researchers are reporting that they can extract a user’s phone number from the Bluetooth traffic coming from an iPhone smartphone during certain operations. The attack works because of how Bluetooth works when it is enabled on an Apple device. The device sends Bluetooth Low Energy […]
Logitech wireless USB dongles vulnerable to cyber attack A large range of Logitech wireless input devices are vulnerable to attack and can pose a significant security risk. With this hack, not only can attackers eavesdrop on keystrokes, but they can also infect the host system. Security expert Marcus Mengs investigated the wireless connections of […]
We would like to wish you a very happy and productive 2019! We look forward to taking care of your technology needs throughout the new year!
The FBI has issued a recommendation for everyone to reboot due to malware **Please be advised that if you’re using a CradlePoint router from RHYNO, you are already protected and don’t need to worry. We’ve already taken care of everything; your security and privacy were not compromised. Hackers have switched their focus and have […]
It’s official; Apple is exiting the wireless router business. Apple has already begun to sell off its remaining inventory of AirPort products in their transition away from wireless routers. The AirPort Express, AirPort Extreme, and the AirPort Time Capsules have all been discontinued. In a statement to 9to5Mac, they stated that they’re discontinuing the […]
Microsoft & Unifi has already fixed the Wi-Fi attack vulnerability: Technology companies are starting to respond to a new Wi-Fi exploit affecting all modern Wi-Fi networks using WPA or WPA 2 encryption. The security vulnerabilities allow attackers to read Wi-Fi traffic between devices and wireless access points, and in some cases even modify it to […]