Suche
Beiträge, die mit network getaggt sind
Fraudsters can expose fake 2G networks (carried in a backpack) and easily trick mobile phones to connect to them. Make sure to disable 2G if you got the option in Android as it is an insecure network that was designed in the 80s. 3G/4G/5G have enough coverage these days.
security.googleblog.com/2024/0…
#security #mobile #phones #android #network #phishing
Keeping your Android device safe from text message fraud
Posted by Nataliya Stanetsky and Roger Piqueras Jover, Android Security & Privacy Team Cell-site simulators , also known as False Base St...Google Online Security Blog
Find my #hacker: How #Apple's #network can be a potential #tracking tool
Source: cec.gmu.edu/news/2025-02/find-…
#AirTag sends #Bluetooth messages to nearby Apple devices, which then anonymously relay its #location via Apple #Cloud to the owner for tracking. Their attack method can turn a device—whether it's a #desktop, #smartphone, or #IoT device—into an "AirTag" without Apple's permission, at which point the network begins tracking.
Turn of Bluetooth whenever you can! 😱
#news #technology #Software #Problem #hack #security #privacy #surveillance #spy #vulnerability
Find my hacker: How Apple's network can be a potential tracking tool
George Mason researchers discovered that Apple's "Find My" service can be used for malicious purposes.College of Engineering and Computing
#Unboxing the #OpenWrtOne #Router with open #Software and open #Hardware and with the coolest #features at the moment!
The only instructions you receive are printed directly on the packaging. A great extension option is the #MikroBus: mikroe.com/mikrobus - It has both a #serial and an #I2C bus via which #IoT sensors can be connected.
There is also the option of connecting an #SSD, which I used immediately. I would also like to use the router as a #weather #monitoring station via appropriate sensors and then save the data on the SSD and have it evaluated and displayed via a #web #server.
The accessories supplied include a power supply unit, antennas, some screws and jumpers as well as a screwdriver. However, the screws on the case were so tight that I needed a better tool to open it.
I plan to provide my neighborhood with free #wifi via the router. I also want to run some web applications there and make them publicly accessible on the #Internet. So stay tuned and I will tell you here about the #configuration, #installation and results ...
mikroBUS - MIKROE
The mikroBUS™ socket comprises a pair of 1×8 female headers with a proprietary pin configuration and silkscreen markings.MIKROE
#SSH into #RaspberryPi from Outside Home #Network Using #Tailscale
source: itsfoss.com/tailscale-raspberr…
Its key mechanics include:
* #Mesh #Networking: Devices in your Tailscale network (or "tailnet") connect directly to each other where possible, creating a mesh of encrypted connections.
* End-to-End #Encryption: All traffic is encrypted from one device to another, ensuring privacy and security.
* #NAT Traversal: Tailscale automatically handles NAT traversal and #firewall configurations, so you don’t need to worry about setting up port forwarding or exposing services.
* Auto-Routing: Once your devices are connected to the #tailnet, Tailscale automatically routes traffic between them as needed.
#router #administration #security #software #foss #floss #howto #tutorial #knowledge #linux
SSH into Raspberry Pi from Outside Home Network Using Tailscale
Learn how you can use Tailscale to secure connect to your Raspberry Pi from outside your home network.Abhishek Kumar (It's FOSS)