Wireless

now browsing by tag

 
 

#comptia | Deals on the 16-inch MacBook Pro, truly wireless earphones, and PS4 Pro

Source: National Cyber Security – Produced By Gregory Evans

Most of the deals that we publish at The Verge come and go before the weekend arrives. That’s just the way it works sometimes. However, some deals are still happening and they’re just as good as they were earlier this week.

Apple’s 16-inch MacBook Pro it introduced in late 2019 (shown above) is up to $200 off at Best Buy. The most affordable build costs $2,249 (usually $2,399), and it has a six-core Intel Core i7 CPU, 16GB of RAM, AMD’s Radeon Pro 5300M graphics chip, and a 512GB SSD.

You’ll get $200 off Apple’s more powerful configuration. It has an eight-core Intel Core i9 CPU, 16GB of RAM, AMD’s Radeon Pro 5500M graphics, and a 1TB SSD. Usually $2,799, you can get it right now for $2,599. To get this discount, you’ll need to be a My Best Buy member, and signing up is free and only requires an e-mail address.

Photo by Chris Welch / The Verge

Amazon’s capable, truly wireless earphones that have Bose’s noise isolation tech built in are $40 off. They’ll cost you $90, which is a great price if you’re deciding between this and the many more expensive options out there from Apple, Sony, and others.

Photo by Chris Welch / The Verge

Alternatively, Wellbots is offering a big limited-time discount on Anker’s Soundcore Liberty 2 Pro that have a few features up on Amazon’s model listed above. They, too, have above-average sound quality and a comfy fit. But if you want them to come in a case that supports USB-C charging and wireless charging, these Anker truly wireless earphones have you covered. Normally $150, you can get them for $110 with the offer code VERGEMUSIC.

It’s no secret that Sony plans to release the PlayStation 5 later this year. But if you haven’t yet played through all of the exclusive games for the PlayStation 4 like God of War (and in 4K, no less), Woot is offering a good deal on the PS4 Pro console. Usually $399, it’s $299 for a limited time.

Source link

The post #comptia | Deals on the 16-inch MacBook Pro, truly wireless earphones, and PS4 Pro appeared first on National Cyber Security.

View full post on National Cyber Security

#nationalcybersecuritymonth | Don’t rush to rip out your landline – it could pay you to WAIT for the wireless 5G revolution

Source: National Cyber Security – Produced By Gregory Evans

For better and for worse, our lives have been revolutionised by the internet. But a new high-tech innovation known as 5G is set to transform everything once again.

The internet plays a pivotal role in our lives thanks to broadband piped through our homes. But ‘fifth generation’ 5G will take this a giant step forward.

It will enable mobile phones to use wireless broadband that matches the best fibre optic speeds. We will be able to rip out old phone lines and internet cables that clutter the house – and instead use mobile reception for all our needs.

Experts believe 5G will lead to an explosion of new ‘smart’ gadgets that talk to our mobile phones through more reliable superfast signals – offering everything from fridge cameras that order groceries when the contents are running low, to robot chauffeurs that can take us around in a self-driving car.

The possibilities of this connection of gadgets – known as ‘the internet of things’ – seem almost limitless.

The 5G technology will start by making pin-sharp video phone calls the norm so we can ditch our landlines, if we haven’t already.

And with broadband download speeds of perhaps 200 Megabits per second (Mbps) – which is more than four times faster than the current average home broadband speed – the technology will also help us economise, clean the home and be more secure.

Smartphone apps controlled by 5G will monitor our heating and lights – turning gadgets off when not needed – while providing 24-hour security with cameras viewed from our phones.

They will also run robotic vacuum cleaners and lawn-mowers when we are away on holiday.

But 5G is not without its critics. Last week, the Government came under fire when it announced Chinese firm Huawei would be allowed to be a major player in the building of the UK 5G network.

Experts fear it could allow Chinese spies to eavesdrop on private conversations and install ‘a Trojan horse’ – holding communication networks to ransom with the threat of a cyber war.

Ernest Doku, a technology expert at comparison website uSwitch, says: ‘5G has the potential to transform the way we live – but at this stage it is no silver bullet as we still need to ensure everyone has access to the connection before it can change the world.

‘Last year, it started to be rolled out in major cities such as London, Edinburgh, Cardiff and Belfast – though connectivity is still small and patchy. And you need an expensive new smartphone such as the £800 Samsung Galaxy S10 to gain access.

‘So far Apple devices cannot connect to the 5G network and the revolution cannot begin in earnest until they do – which may happen when the latest iPhone models come out in September.’

Download speeds are at least ten times faster with 5G than on the previous best 4G technology – far better than most people’s home broadband and in line with top fibre optic speeds.

It means not only lightning fast access to the internet but the ability to download music and movies much quicker. Downloading a feature film on 4G can take a quarter of an hour – but with 5G it might take just 90 seconds.

BUT WATCH OUT FOR STINGRAYS! 

New 5G technology offers an exciting opportunity to improve our networks – but it also opens a new door for fraudsters.

One of the key concerns is the threat of so-called ‘stingrays’. This is where a criminal intercepts your mobile signal with a copycat aerial that tricks it into sharing encrypted identifying data about the phone.

Using this information, the fraudster knows what handset you are using, can track your exact whereabouts and might even be able to hack into your phone operating system’s software.

If this is achieved it might be possible to break into your apps that control and monitor 5G ‘smart’ gadgets. By cracking such codes criminals can eavesdrop on phone conversations and even spy on what you get up to from security cameras you place around the home. Harvesting information that can be seen when you tap into a mobile phone could also enable a fraudster to steal identities, using your personal information to go on an online spending spree or using personal details to empty your bank account.

Cyber security expert Colin Tankard, of Digital Pathways, says: ‘The public needs to be aware of the dangers of this new technology – and with more gadgets being hooked up to 5G it increases the risk of problems if you should get hacked.’

Tankard believes those that embrace 5G must ensure they add a layer of security to their smartphones by downloading ‘virtual private network’ software on to their handsets via an app. Such free software is available from security specialists such as Avira, Symantec and Sophos. Decrypting your phone signals to spy on private conversations is one of the key concerns of the critics of the Chinese 5G manufacturer Huawei. The Government is adamant that it has addressed such security issues by only allowing it to have a maximum 35 per cent stake in any projects – with sensitive areas such as military bases and nuclear facilities strictly off limits.

But this has not stopped the National Cyber Security Centre – the cyber war combat arm of the Government’s intelligence service – from voicing concern. The NCSC has listed Huawei as a ‘high-risk’ firm for security.

NCSC technical director Dr Ian Levy says: ‘The level of security in our networks needs to improve as our reliance on them increases. The threat for UK operators ranges from hostile states to organised crime and petty fraudsters.’

There are just a handful of main providers of the technology that supply 5G to customers of mobile networks such as EE, Vodafone and O2. These include Finnish phone giant Nokia, Swedish company Ericsson, South Korean firm Samsung and Chinese part-state run ZTE. But the most controversial is Huawei.

Last week, it was licensed to have up to a 35 per cent market share in 5G projects – supplying masts, antennae and cables. But it was banned from participating in 5G provision for military bases and nuclear plants.

The mobile market leader in 5G is EE. Even though 5G reception at the moment is almost non-existent outside cities (though EE claims it is available in 50 UK locations), signing up to the new technology is not cheap.

You pay £54 a month to EE for its best-selling Samsung Galaxy S10 5G deal – which includes 10GB of data a month, enough for 500 hours of internet browsing. You then pay a further £30 upfront for the device and must sign up for two years. Vodafone has slightly less 5G nationwide coverage and costs £56 a month with £49 upfront for the same phone and 5GB of data each month if you sign up for two years.

Another company that recently joined the fledgling 5G party is O2. It charges £54.64 a month plus an upfront £30 for a Galaxy S10 5G phone and 15GB of data usage a month – but only if you are willing to sign up for at least 36 months.

If you are using your phone in an area with no 5G reception then the mobile automatically reverts to the previous fastest-speed service 4G – or goes on to 3G or 2G if this reception is not available either.

THE way the technology works is by using a new radio bandwidth that allows more information to be packed into a broadcast than previously possible. But it also requires older 4G masts to be adapted so they can send and receive data on the new wavelength.

The 5G technology will also require small transmitters to be positioned on streets outside people’s homes to ensure ‘smart’ devices in the home can be connected with no interference or loss of signal.

Such building work will cost many millions of pounds and because it is still in the early stages, the ‘smart’ gadgets that can use it are not widespread.

Although we might expect 5G to become more popular this year – so far it has a geographical coverage of less than 5 per cent – it could take a decade before devices other than mobile phones catch up with this super-fast broadband wireless technology.

Doku says: ‘Although it may be exciting to be among the first people to embrace this new technology, prices for 5G phones and access to the 5G network should fall if you hold on for at least 12 months.

‘Also, as a newbie, you may initially be disappointed as national coverage is still poor and the number of gadgets connecting to 5G is limited.

‘But the potential for 5G to transform the way we live and manage our homes is really exciting.’ 

Some links in this article may be affiliate links. If you click on them we may earn a small commission. That helps us fund This Is Money, and keep it free to use. We do not write articles to promote products. We do not allow any commercial relationship to affect our editorial independence.

Source link

The post #nationalcybersecuritymonth | Don’t rush to rip out your landline – it could pay you to WAIT for the wireless 5G revolution appeared first on National Cyber Security.

View full post on National Cyber Security

#cybersecurity | #hackerspace | How Idaptive Helped SBA Communications Uncross Its Wires To Achieve More Innovative Wireless Delivery

Source: National Cyber Security – Produced By Gregory Evans

Wireless communications infrastructure company SBA Communications knew it was likely going to remain one of the smaller of that industry’s “big three” (behind American Tower and Crown Castle), and CEO Jeffrey Stoops was perfectly OK with that. As long as SBA Communications continued to prize being relevant and innovative over being big, they would cement their reputation.

“We were never going to be the largest,” said Stoops in a conversation with Inside Towers managing Editor Jim Fryer on an episode of the “Tower Talks” podcast. “Instead, we focused on trying to build and acquire and operate the best quality assets that we could. Assets that would stand the test of time and that would always be relevant to our customers. Assets that could navigate not just where the industry was at the time, but where it was headed.” 

When SBA Communications began using SaaS-based apps like Innotas, ExpenseWatch, and Yammer, they implemented Microsoft’s Active Directory Federation Service (AD FS) and although it met their needs at the time, AD FS proved challenging to integrate. The process was time-consuming and expensive, and slowed SBA’s digital evolution. As cloud-based apps began to become more and more vital to their operation, it was clear something had to change. 

A Migration Impasse

When a new version of AD FS was released shortly after SBA Communications adopted the service, the company was faced with another arduous and expensive integration process. Instead, they decided on the slightly lesser of two evils – not integrating the new version, and instead running two live versions of AD FS. It was clearly not ideal. “Integration was so painful the first time around that we dreaded having to migrate those same apps into the new environment,” says SBA Communications Senior Vice President and Chief Information Officer Jorge Grau. “When resources are scarce, migrating a product that’s already working never becomes a priority.” 

To tackle their unwieldy and inefficient system, SBA Communications began looking at IDaaS solutions. The decision would involve more than just the bottom line, as the company considered a number of factors. “In the end, it wasn’t just about dollars,” says Grau. “It came down to product functionality and which provider would best support us in integrating new apps. Company reputation, customer interviews, and existing integrations with SaaS providers also played a significant role. Mobile Device Management (MDM) capabilities were the icing on the cake.” 

A Fix For Everything

SBA Communications prides itself on staying ahead of the curve, and they were being weighed down by inefficient systems. Idaptive allowed for simpler integration with cloud apps and mobile device flexibility. But more importantly, it allowed them to – in Stroop’s words – keep an eye on “where the industry was headed” by improving security measures in light of several high-profile data breaches in the communications industry. With Idaptive, SBA Communications could more easily enforce passwords on devices, encrypt mobile communications, and could even eliminate proprietary SBA Communications email from any mobile device at a moment’s notice. 

Not only was Idaptive’s solution more efficient and empowering, it saved SBA Communications an estimated $50,000-$60,000 a year in AD FS costs and negated the need for a separate MDM solution entirely. Integrations take significantly less time, and there is no redundancy and fewer security vulnerabilities. 

As it stands among the “big three,” SBA Communications was now poised to challenge size and scale with innovation, flexibility, and security. And they are perfectly OK with that. 

Source link

The post #cybersecurity | #hackerspace |<p> How Idaptive Helped SBA Communications Uncross Its Wires To Achieve More Innovative Wireless Delivery <p> appeared first on National Cyber Security.

View full post on National Cyber Security

International #Summit on #Telecommunications,#Cloud #computing and #Wireless #Technology

General Cybersecurity Conference

 August 23 – 28, 2018 | Outram Rd, Singapore

Cybersecurity Conference Description

Telecommunications 2018 is a leading forum for Business professionals, Scientists, Professor, Directors of companies, Delegates, Industrialists, Researchers and Students in the field of Telecommunication & Wireless to exchange information on their latest research progress and with a theme “Emerging Innovation in communication and wireless technology for connecting the world” to cover almost all aspects and fields of Telecommunications, Cloud computing and Wireless Technology.

Importance and Scope

International Summit on Telecommunications, Cloud computing and Wireless Technology is organizing an outstanding Scientific Exhibition/Program and anticipates the world’s leading specialists involved in Telecommunications, Cloud computing and Wireless Technology . Your organization will benefit with excellent exposure to the leaders in Wireless and Telecommunication. You can update your knowledge about current situation of Telecommunication &Wireless Technology and receive name recognition at this 2-day event. Telecommunications 2018 is an exciting opportunity to showcase the new technology. World-renowned speakers, the most recent techniques, tactics, and the newest updates in Telecommunications, Cloud computing and Wireless Technology fields are hallmarks of this conference.

advertisement:

The post International #Summit on #Telecommunications,#Cloud #computing and #Wireless #Technology appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Restaurant-goer has #Bitcoins #stolen over #unsecured public #wireless #network

Source: National Cyber Security – Produced By Gregory Evans

AFTER logging on to the public Wi-Fi at a restaurant, a man unwittingly had $155,000 stolen from his digital wallet. This is the real problem with Bitcoin.

AN UNSUSPECTING diner has had $155,000 worth of the digital currency Bitcoin stolen from him while logged on to a restaurant’s unsecured public Wi-Fi network.

The incident reportedly took place in an Austrian restaurant this week with the cyber thieves moving the digital currency to an “unknown, non-traceable account,” police said in a statement.

The 36-year-old victim reportedly logged on to the unsecured network to check the value of his Bitcoin holdings. He later realised that $100,000 euros worth had been stolen.

It remains unclear whether the victim’s account was already hacked before he logged on to the unsecured network, police said.

The incident, while small in nature, highlights the issue of hackers targeting personal Bitcoin accounts as the digital currency has exploded in value in recent years.

While Bitcoin is arguably becoming mainstream, it has had to endure a string of controversies along the way.

In January 2014, a Japanese-based Bitcoin exchange known as Mt Gox was hacked. It was once the largest bitcoin intermediary and the world’s leading bitcoin exchange before thieves made off with 850,000 BTC. At today’s value, that’s worth a staggering $A 9,147,700,000.

In June this year, South Korea’s largest Ethereum (another popular cryptocurrency) and Bitcoin exchange was breached by hackers who stole customers’ data and targeted their accounts in an effort to drain their digital wallets. According to local media reports, one person claimed to have lost 1.2 billion won, or about $A1.4 million.

And this week, a cryptocurrency start-up specialising in Initial Coin Offerings (ICOs) called Confido raised about $500,000 before the company’s website and founders vanished, along with the cash.

These are just a few examples of the potential dangers posed by operating in the still emerging crypto market. That being said, the threat of hackers certainly isn’t a problem confined to cryptocurrencies as hackers have also targeted central banks, recently fleecing more than $US100 million from the Bangladesh central bank’s account at the US Federal Reserve.

But if you’re going to check how much your Bitcoin wallet is worth, maybe be careful about where you log on.

The post Restaurant-goer has #Bitcoins #stolen over #unsecured public #wireless #network appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Wireless Hacking In Flight: Air Force Demos Cyber EC-130

Source: National Cyber Security – Produced By Gregory Evans

NATIONAL HARBOR: Matthew Broderick in his basement, playing Wargames over a landline, is still the pop culture archetype of a hacker. But as wireless networks became the norm, new-age cyber warfare and traditional electronic warfare are starting to merge. Hackers can move out of the basement to the sky. In a series of experiments, the US Air Force has successfully modified its EC-130 Compass Call aircraft, built to jam enemy transmissions, to attack enemy networks instead. “We’ve conducted a series of demonstrations,” said Maj. Gen. Burke Wilson, commander of the 24th Air Force, the service’s cyber operators. “Lo and behold! Yes, we’re able to touch a target and manipulate a target, [i.e.] a network, from an air[craft].” What’s more, Wilson told reporters at the Air Force Association conference here, this flying wireless attack can “touch a network that in most cases might be closed” to traditional means. While he didn’t give details, many military networks around the world are deliberately disconnected from the Internet (“air-gapped”) for better security. You can try to get an agent or dupe to bring a virus-infected thumb drive to work, as reportedly happened with Stuxnet’s penetration of the Iranian nuclear program, but that takes time and […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post Wireless Hacking In Flight: Air Force Demos Cyber EC-130 appeared first on National Cyber Security.

View full post on National Cyber Security

LMCDProSD: Compact Professional Camera Hunter with Wireless Recording

The LMCDProSD detects PAL and NTSC, which are the two most common video standards worldwide. This unit has two dedicated antennas that scan 1.2 GHz, 2.4GHz, and 5.8GHz bands for up to 300 feet. You can even tap directly into the signal of the detected hidden camera with the LMCDProSD’s video output connection. Read More….

The post LMCDProSD: Compact Professional Camera Hunter with Wireless Recording appeared first on Dating Scams 101.

View full post on Dating Scams 101

5 Denver wireless hot spots are known to be used by hackers

5 Denver wireless hot spots are known to be used by hackers

Let’s talk public wireless. You don’t need to be a technology guru to know that connecting to free Wi-Fi in public spaces is not the most secure decision. However, even savvy mobile users will log in to free wireless at […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

View full post on National Cyber Security

EFF Wants To Build Open Wireless Router

The Electronic Frontier Foundation is calling on the hacker community to help create an Open Wireless Router. The organization released an alpha version of the firmware over the weekend, reporting that the software is designed to support shareable,

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post EFF Wants To Build Open Wireless Router appeared first on National Cyber Security.

View full post on National Cyber Security