Security News

CommScope announced it is expanding its industry leading Wi-Fi 6 home network gateway portfolio with the release of its NVG578LX 2.5G GPON Wi-Fi 6 residential gateway. The NVG578LX GPON home network gateway provides true gigabit speeds for the delivery of managed voice, video and data services.

Change your macOS power settings to prevent disconnecting from VPN/Wi-Fi when the computer is locked
You should always lock your computer when you walk away. I'm a firm believer in locking your computer when you step away from it for any amount of time.

Super-secure air-gapped computers are vulnerable to a new type of attack that can turn a PC's memory module into a modified Wi-Fi radio, which can then transmit sensitive data at 100 bits-per-second wirelessly to nearly six feet away. Noted air-gap researcher Mordechai Guri created the proof-of-concept attack and described it in a research paper released earlier this month under the auspices of Ben-Gurion University of the Negev, Israel's cybersecurity research center.

Covert Wi-Fi signals generated by DDR SDRAM hardware can be leveraged to exfiltrate data from air-gapped computers, a researcher claims. In a newly published paper, Mordechai Guri from the Ben-Gurion University of the Negev in Israel details AIR-FI, a new data exfiltration technique in which malware installed on a compromised air-gapped system can generate Wi-Fi signals that a nearby device intercepts and sends to the attacker, over the Internet.

In a newly released working paper [PDF], "AIR-FI: Generating Covert Wi-Fi Signals from Air-Gapped Computers," Guri, head of research and development at Ben-Gurion University of the Negev, Israel's Cyber-Security Research Center, describes a technique for turning DDR SDRAM buses into transmitters that can spew sensitive data. It's a method for sending data via Wi-Fi signals when the target device doesn't have Wi-Fi capability.

A security researcher has demonstrated that sensitive data could be exfiltrated from air-gapped computers via a novel technique that leverages Wi-Fi signals as a covert channel-surprisingly, without requiring the presence of Wi-Fi hardware on the targeted systems. Dubbed "AIR-FI," the attack hinges on deploying a specially designed malware in a compromised system that exploits "DDR SDRAM buses to generate electromagnetic emissions in the 2.4 GHz Wi-Fi bands" and transmitting information atop these frequencies that can then be intercepted and decoded by nearby Wi-Fi capable devices such as smartphones, laptops, and IoT devices before sending the data to remote servers controlled by an attacker.

Google patched ten critical bugs as part of its December Android Security Bulletin. The worst of the bugs was tied to the Android media framework component and gives attacker remote control of vulnerable handsets.

Did you know you can join us for a live cybersecurity lecture every Friday? Thanks for watching hope to see you online later this week!
![S3 Ep9: Gift card hacks, dubious doorbells and Wi-Fi tips [Podcast]](/static/build/img/news/s3-ep9-gift-card-hacks-dubious-doorbells-and-wi-fi-tips-podcast-small.jpg)
In this episode: we look at a network intrusion where the crooks tried to take over dozens of different online accounts from every user, we discuss the potential dangers of digital doorbells, and we give you some handy hints for improving your wireless security at home. LISTEN NOW. Click-and-drag on the soundwaves below to skip to any point in the podcast.

Google Project Zero has disclosed the details of an iOS exploit that allows an attacker to hack iPhones remotely over Wi-Fi and steal sensitive data, without any user interaction. According to Beer, the exploit leverages a single memory corruption vulnerability that can be used against an iPhone 11 Pro device to bypass mitigations and achieve native code execution and kernel memory reading and writing.