Please turn on your JavaScript for this page to function normally.
tunnel
IT teams are embracing intent-based networking, investing in AI technologies

The network is vital to today’s digital business. Whether maximizing employee productivity, optimizing customer experience or keeping data protected and secure, the network is …

5G
Most decision makers expect AI and 5G to impact their cybersecurity strategy

An overwhelming majority of cybersecurity and risk management leaders believe that developments in 5G wireless technology will create cybersecurity challenges for their …

wireless
New protocol extends Wi-Fi range, can be used with existing hardware

A protocol that significantly extends the distance a Wi-Fi-enabled device can send and receive signals has been created by a group of researchers led by a Brigham Young …

bulb
Could lighting your home open up your personal information to hackers?

Earlier this year Amazon’s Echo made global headlines when it was reported that consumers’ conversations were recorded and heard by thousands of employees. Now …

Cisco wireless
Cisco fixes serious flaws in enterprise-grade Catalyst and Aironet access points

Cisco has released another batch of security updates, the most critical of which fixes a vulnerability that could allow unauthenticated, remote attackers to gain access to …

5G
The global impact of 5G technologies

A white paper produced by Rysavy Research and 5G Americas technical experts explores the intensifying role of wireless communications, the evolution of its technology, …

wireless
Researchers develop cheaper, more efficient Internet connectivity for IoT devices

A cheaper and more efficient method for IoT devices to receive high-speed wireless connectivity has been developed by researchers at the University of Waterloo. With 75 …

Bluetooth
Critical Bluetooth flaw opens millions of devices to eavesdropping attacks

A newly disclosed vulnerability (CVE-2019-9506) in the Bluetooth Core Specification can be exploited by attackers to intercept and manipulate Bluetooth communications/traffic …

Warshipping: Attackers can access corporate networks through the mailroom

Most infosecurity professionals have heard of wardialing and wardriving, but what about warshipping? The expression has been coined by IBM X-Force Red researchers to describe …

Apple connection
AWDL flaws open Apple users to tracking, MitM, malware planting

Vulnerabilities in Apple Wireless Direct Link (AWDL), the wireless protocol that underpins Apple’s AirPlay and AirDrop services, could allow attackers to track users in …

wireless
Countering industrial cyberthreats with secure, standards-based, licensed wireless networks

Over the past few years, cyber threats aimed at a number of critical infrastructure targets have drawn our attention to the security of mission critical networks. These …

TP-Link Wi-Fi extender
Vulnerable TP-Link Wi-Fi extenders open to attack, patch now!

Several TP-Link Wi-Fi extender devices sport a critical remote code execution vulnerability that could allow attackers to take over the devices and command them with the same …

Don't miss

Cybersecurity news