"Anything you are logged into when you reconnect it basically relogs in, so there is an opportunity for an attacker to capture the cookie or maybe even the password," he said.
And chances are good that your beloved smartphone is constantly — relentlessly — looking for networks to connect to.
"When you have wireless turned on," says Oliver Weis, who works with Porcello at their company, Pwnie Express, "your phone or your laptop is sending out what are called probe requests out to the world — saying, 'Hey, where is my network? Where is my network? Is this network around? Where is this network?' " If your phone believes the cat, Weis says, the cat can intercept all traffic going through your phone.
http://www.npr.org/blogs/alltechconsidered/2014/06/13/321389989/heres-one-big-way-your-mobile-phone-could-be-open-to-hackers?ft=1&f=1019
Comcast pointed out that for a more secure system to work, it will need the cooperation of every company that makes a device that connects with the network. That takes time.
And chances are good that your beloved smartphone is constantly — relentlessly — looking for networks to connect to.
"When you have wireless turned on," says Oliver Weis, who works with Porcello at their company, Pwnie Express, "your phone or your laptop is sending out what are called probe requests out to the world — saying, 'Hey, where is my network? Where is my network? Is this network around? Where is this network?' " If your phone believes the cat, Weis says, the cat can intercept all traffic going through your phone.
http://www.npr.org/blogs/alltechconsidered/2014/06/13/321389989/heres-one-big-way-your-mobile-phone-could-be-open-to-hackers?ft=1&f=1019
Comcast pointed out that for a more secure system to work, it will need the cooperation of every company that makes a device that connects with the network. That takes time.
No comments:
Post a Comment