Tag Archive | "wireless"


23 November 2007 | 16,005 views

Wi-Fi Jacking Extremely Common (45% of People Do!)

It seems Wi-Fi is actually extremely common, in fact in a recent poll up to 45% do it! I guess most people here have, I admit I do even with my phone when I’m out and about I’ll use any WiFi point that works. We can blame it on the manufacturers for having lax default [...]

Continue Reading


04 June 2007 | 7,700 views

Michigan Man Fined $400 for Using Coffee Shop’s Wi-Fi Network

Well this is a harsh turn of events, a while back an ‘ethics expert’ said Wifi Jacking is OK, now this poor guy has got pretty harshly screwed for using an open wireless connection from a nearby coffeeshop. A Michigan man has been fined $400 and given 40 hours of community service for accessing an [...]

Continue Reading


23 June 2006 | 13,208 views

Researchers hack Wi-Fi driver to breach laptop

Ah another way to exploit wifi, what a surprise! Security researchers have found a way to seize control of a laptop computer by manipulating buggy code in the system’s wireless device driver. The hack will be demonstrated at the upcoming Black Hat USA 2006 conference during a presentation by David Maynor, a research engineer with [...]

Continue Reading


06 June 2006 | 7,601 views

RFID & Biometrics Used At World Cup in Germany

RFID, biometrics, hi-tech police officers, yes it’s all going to be happening in Germany for the close approaching World Cup 2006. Not surprisingly, security is a top priority for the German government, even higher than its desire to see the national team walk off the pitch with the World Cup 2006 trophy. The list of [...]

Continue Reading


16 May 2006 | 39,069 views

Anonymity – Hiding Your Identity in 2006

Introduction Anonymity is derived from the greek word ἀνωνυμία (anonymia), meaning without a name or name-less. In colloquial use, the term typically refers to a person, and often means that the Ppersonal identity, or personally identifiable information of that person is not known. The main question is of course, what are you trying to hide? [...]

Continue Reading


Popular Tags

computer-security · darknet · exploits · google · hacking · hacking-networks · hacking-websites · hacking-windows · hacking tool · Hacking Tools · Information-Security · information gathering · malware · microsoft · network-security · Network Hacking · Password Cracking · penetration-testing · Phishing · Privacy · Python · scammers · Security · Security Software · spam · spammers · sql-injection · trojan · trojans · virus · viruses · vulnerabilities · web-application-security · web-security · Web Hacking · windows · windows-security · Windows Hacking · worms · XSS ·