Researchers have discovered that it is possible to manipulate traffic on a WiFi chip and extract passwords. They named the technique coexistence attacks. An attacker can even run malicious code on a compromised WiFi chip without it being connected to a wireless network and pilfer passwords. The recent research paper has been shared with chip vendors but only some have released security updates against the bug.
- Next story Kaspersky Managed Detection and Response: interesting cases
- Previous story Seedworm Targeting Telecom, IT, and Utility firms in the Middle East and Asia
Popular Tags
Attack (593)
attacks (557)
computer security (768)
cyber attacks (769)
cyber news (822)
Cybersecurity (1428)
cyber security news (822)
cyber security news today (822)
cyber security updates (822)
cyber updates (822)
Data (750)
data breach (828)
ethical hacking (885)
hack android (885)
hack app (885)
hacker news (1646)
Hackers (526)
hacking (1209)
hacking news (761)
hacking tools for windows (885)
hack wordpress (885)
how to hack (761)
information security (785)
keylogger (887)
kit (893)
kitploit (885)
Malware (811)
network security (768)
password brute force (885)
penetration testing (887)
pentest (889)
pentest android (885)
pentest linux (885)
pentest toolkit (885)
pentest tools (885)
Phishing (468)
Ransomware (1080)
ransomware malware (761)
security (1197)
software vulnerability (761)
spy tool kit (885)
spyware (942)
the hacker news (762)
tools (942)
vulnerabilities (507)
Best Articles