- Smartphone WiFi Signals Can Leak Your Keystrokes, Passwords, and PINs. From Beeling Computer.
The way users move fingers across a phone’s touchscreen alters the WiFi signals transmitted by a mobile phone, causing interruptions that an attacker can intercept, analyze, and reverse engineer to accurately guess what the user has typed on his phone or in password input fields.
This type of attack, nicknamed WindTalker, is only possible when the attacker controls a rogue WiFi access point to collect WiFi signal disturbances.
Control over the WiFi access point is also imperial since the attacker must also know when to collect WiFi signals from the victim, in order to capture the exact moment when the target enters a PIN or password.
If you’re at the Rio Olympics, you’ve probably already been hacked. From Daily Dot. While athletes head to Rio de Janeiro, Brazil to compete for medals in the 2016 Summer Olympic Games, hackers in the area have their eyes on a different prize: the personal information of unsuspecting travelers. According to a new report from mobile security firm Skycure, visitors to the former capital of Brazil are being targeted by malicious actors who have set up fake Wi-Fi hotspots designed to steal information from connected devices. These phony wireless networks were spotted by Skycure around the city, but they were most prominent in locations where travelers were most likely to look for a place to connect, like shopping malls, well-known coffee shops, and hotels.
MEET DANGER DRONE – A FLYING COMPUTER DESIGNED TO HACK INTO ALL YOUR UNPROTECTED DEVICES. From Digital Trends. For Fran Brown, one of the managing partners at renowned security firm Bishop Fox, it all started with Top Gun. “I was watching [the movie] as I often do, and Kenny Loggins’ song came on, and I suddenly thought ‘Danger Drone‘ — that would be an awesome name for a project,” he told Digital Trends. “It went from there.” Feeling inspired, Brown went on to co-create Danger Drone — or, as he puts, “a hacker’s laptop that can fly.” In essence, the concept is a $500 Raspberry Pi-based quadcopter drone, kitted out with all the regular hacking software security firms deal with on a regular basis.
- The man who cracked the first iPhone reveals how hackers really operate. From Tech Insider. The man who cracked Apple’s security protocols and unlocked the first iPhone gave us all a five-minute hacking lesson, courtesy of Viceland’s Cyberwar series. In a clip that didn’t make it on television, George Hotz (aka “geohot”) takes host Ben Makuch through the steps necessary for him to gain access to a laptop connected to WiFi. For the purposes of the demo, Hotz placed a laptop in his office, which is connected to his WiFi network. But, he explains, it just as well could be connected to the Internet.