Security News
A wireless network naming bug has been discovered in Apple's iOS operating system that effectively disables an iPhone's ability to connect to a Wi-Fi network. The issue was spotted by security researcher Carl Schou, who found that the phone's Wi-Fi functionality gets permanently disabled after joining a Wi-Fi network with the unusual name "%p%s%s%s%s%n" even after rebooting the phone or changing the network's name.
A new iPhone bug has come to light that breaks your iPhone's wireless functionality by merely connecting to a specific WiFi hotspot. Once triggered, the bug would render your iPhone unable to establish a WiFi connection, even if it is rebooted or the WiFi hotspot is renamed.
A new iPhone bug has come to light that breaks your iPhone's wireless functionality by merely connecting to a specific WiFi hotspot. Once triggered, the bug would render your iPhone unable to establish a WiFi connection, even if it is rebooted or the WiFi hotspot is renamed.
Organizations can only deploy today's Wi-Fi 6 access points and 5G small cell access nodes where AC power is available or if their switch can deliver both power and data to them as required. Microchip Technology has created a more flexible and cost-effective alternative with the first multiport Power over Ethernet power sourcing equipment injector, also known as a midspan, that enables any multigigabit switch to support these devices' high powering needs and data rates, with no network configuration or downtime necessary.
Zyxel Communications announced the upcoming launch of a new WiFi 6 series, the DX3300, DX3301, EX3300, EX3301 and WX3100. This new offering will be one of Zyxel's most cost-competitive product series for migration to WiFi 6 Mesh and is a great choice for service providers who want to offer these capabilities under an existing copper or fiber infrastructure.
A new set of critical vulnerabilities has been disclosed in the Realtek RTL8170C Wi-Fi module that an adversary could abuse to gain elevated privileges on a device and hijack wireless communications. "Successful exploitation would lead to complete control of the Wi-Fi module and potential root access on the OS of the embedded device that uses this module," researchers from Israeli IoT security firm Vdoo said in a write-up published yesterday.
Starting June 8, Amazon will automatically enable a feature on its family of hardware devices, including Echo speakers, Ring Video Doorbells, Ring Floodlight Cams, and Ring Spotlight Cams, that will share a small part of your Internet bandwidth with nearby neighbors - unless you choose to opt-out. Originally announced in September 2019, Sidewalk is part of Amazon's efforts to build a long-range wireless network that leverages a combination of Bluetooth and 900 MHz spectrum to help Echo, Ring, Tile trackers, and other Sidewalk-enabled devices communicate over the internet without Wi-Fi. Sidewalk is designed to extend the working range of low-bandwidth devices, and help devices stay connected even if they are outside the range of a user's home Wi-Fi network.
Aruba announced the Wi-Fi 6E solution set - the 630 Series of campus access points, starting with the AP-635. "With connectivity demands growing exponentially, Wi-Fi 6E can take advantage of up to seven, superwide 160 MHz channels and uncongested bandwidth in the 6 GHz band to deliver unprecedented multi-gigabit and low latency connectivity," said Kevin Robinson, SVP of Marketing at Wi-Fi Alliance.
Edgecore Networks announced the launch of a series of open Wi-Fi access points preinstalled with the Telecom Infra Project OpenWiFi image. Edgecore's TIP OpenWiFi-ready access points offer users an open platform that works straight out of the box and which is also highly customizable.
The boffins' research paper, "Three Years Later: A Study of MAC Address Randomization In Mobile Devices And When It Succeeds," is scheduled to be presented at PETS, the Privacy Enhancing Technologies Symposium, in July, even though it will be four years later than the initial project [PDF]. Written by Naval Academy researchers Ellis Fenske, Dane Brown, Jeremy Martin, Travis Mayberry, Peter Ryan, and Erik Rye, the paper describes the analysis of 160 mobile phones and the extent to which these devices employ MAC address randomization to mitigate tracking vulnerabilities.