Nearest Neighbor: a remote attack on Wi-Fi networks
We discuss the recently discovered Nearest Neighbor attack method, which enables attackers to compromise a Wi-Fi network from the other side of the world.
22 articles
We discuss the recently discovered Nearest Neighbor attack method, which enables attackers to compromise a Wi-Fi network from the other side of the world.
Kaspersky experts examined the security of public Wi-Fi hotspots in Paris on the eve of the Olympics.
The exact location of your router is publicly available through global Wi-Fi geolocation databases. Let’s explore why this is necessary, and the risks it entails and how to mitigate them.
Proxyware can make it difficult to detect cyberattacks on organizations — sometimes making the latter unwitting accomplices in crimes.
What’s the easiest way to hack a WPA2-protected wireless network? Using PMKID interception. Here’s how it works, and what you can do to protect yourself.
Espionage operations to hack corporate routers are now commonplace — and all organizations need to be aware of this.
From watching foreign sports to finding the best online sales, we share the top high-speed VPN lifehacks.
What settings do you need to clear before getting rid of a gadget?
Get all the benefits of a VPN — not just on your phone, but on your home computer, game console and smart TV too. The easiest way is to enable the VPN feature on your home router.
Malware can infect your router, slow down the internet connection and steal data. We explain how to protect your Wi-Fi.
To protect MikroTik routers from the Mēris botnet, or to clean a previously infected router, users should update RouterOS and check settings.
Home and SOHO routers are often insecure, but companies can protect themselves from attacks through remote workers’ home routers.
Cybercriminals are hijacking routers to steal people’s credentials for online banking and services.
In this edition of the Kaspersky Lab podcast, we discuss some hot water for Facebook and LinkedIn, Bitcoin falling, German Wi-Fi router guidance, and more.
We discuss what public IPs are, why you might need one, and the risks involved in using them.
Originally targeting users from Japan, Korea, and China, Roaming Mantis is quickly spreading worldwide, infecting smartphones through hacked wi-fi routers.
One of the most sophisticated APT campaigns ever analyzed by our experts.
An unconventional Android Trojan does not do anything to your smartphone; instead it hacks the Wi-Fi hotspot the smartphone is connected to.
Router manufacturers and ISPs are trying to make Wi-Fi set up as easy as possible — and in the security business, we know e-a-s-y spells trouble.
Konstantin Goncharov explains the bottom line of tech giants’ epic fails in the new edition of cybersecurity news digest.
Our today’s weekly news digest covers three stories about the mistakes coders make when programming robots, the way other people exploit those design flaws, and then the reckoning.