Nearest Neighbor: a remote attack on Wi-Fi networks
We discuss the recently discovered Nearest Neighbor attack method, which enables attackers to compromise a Wi-Fi network from the other side of the world.
25 articles
We discuss the recently discovered Nearest Neighbor attack method, which enables attackers to compromise a Wi-Fi network from the other side of the world.
Recent research describes a method for snooping on what Apple Vision Pro users enter on the virtual keyboard.
Researchers have discovered several potential attack vectors targeting bicycles fitted with Shimano Di2 wireless gear-shifting system.
dormakaba Saflok locks — used on around three million doors across 13,000 hotels — are vulnerable to an attack that involves forging electronic keycards.
A credential stuffing attack is one of the most effective ways to take control of accounts. Here’s how it works and what you should do to protect your company.
How hackers exploit chatbot features to restore encrypted chats from OpenAI ChatGPT, Microsoft Copilot, and most other AI chatbots.
SIM swap fraud is back in vogue. We explain what it is, the danger it poses to organizations, and how to guard against such attacks.
What’s the easiest way to hack a WPA2-protected wireless network? Using PMKID interception. Here’s how it works, and what you can do to protect yourself.
We explain what a pig butchering scam is: how it works, why it’s dangerous, and how to protect yourself from it.
VoltSchemer attacks on wireless Qi chargers using modified power sources can “fry” smartphones and other devices, as well as issue commands to voice assistants.
What signs may indicate that a device is infected or being attacked by a hacker.
Which corporate assets should be first in line for protection against cyberattacks?
We review a major cryptocurrency theft using spyware inside a PDF.
We explain a new sneaky technique for stealing passwords, and how to avoid being tricked by a phishing site.
Researcher Patrick Wardle has demonstrated how a chain of exploits can be successfully used to attack macOS Catalina.
Twitter has taken actions to prevent attacks with strobing images on people with epilepsy. Are these actions sufficient?
Malefactors are massively exploiting a vulnerability in Cisco switches, taking down entire segments of the Web.
What 2017 will be remembered for, which of our experts’ predictions came true, and what they think about the future
As a tradition, at the end of the year our GReAT cybersecurity experts publish their predictions for the upcoming year. Let’s see which of last year’s predictions came true and then try