Wednesday, May 25, 2016
Search
  
Submit your own News for
inclusion in our Site.
Click here...
Breaking News
Huawei Sues Samsung Over Mobile Patents
Toyota Is Investing In Uber
Google Enhances Ads For Mobile Devices
LG G5 "Friends" LG CAM Plus, LG 360 CAM, LG 360 VR, LG TONE Devices Launch In US
Twitter Photos, videos And Names in Reply Tweets Will No Longer Count Toward 140-character Limit
Samsung Expands 750 EVO SSD With Availability and Increases Capacity to 500GB
Google's Paris Offices Raided
OCZ RD400 NVMe SSD Series Released
Active Discussions
Which of these DVD media are the best, most durable?
How to back up a PS2 DL game
Copy a protected DVD?
roxio issues with xp pro
Help make DVDInfoPro better with dvdinfomantis!!!
menu making
Optiarc AD-7260S review
cdrw trouble
 Home > News > General Computing > Intel A...
Last 7 Days News : SU MO TU WE TH FR SA All News

Monday, August 07, 2006
Intel Announces Chinks In Its Wireless Radio Software


On Aug. 1, Intel issued a bulletin warning of three flaws in the software that lets its Wi-Fi radios communicate with the Windows operating system.

Although the company said that it knew of no active exploitation of the flaws, one of them was especially dangerous because it could allow an attacker to take remote control of a computer over the air. Then the next day, on Aug. 2, two researchers demonstrated just such an attack at the Black Hat security conference in Las Vegas.

At the event, David Maynor of SecureWorks and Johnny Cache decided to forgo a live demo for fear of giving away too much information to the bad guys, and instead settled for a video that obscured crucial details, but remained plenty scary. In the video, it took Maynor just a minute or so on a Dell laptop to take complete control of an Apple Computer MacBook Pro through a vulnerability in its Wi-Fi card, built by an unidentified third party.

For the time being, there's not a whole lot you can do to protect yourself, short of turning off the wireless adapter on your laptop. Intel has released patches to fix the vulnerabilities in its software, but warns that installing them could cause problems because PC manufacturers frequently install modified versions on their own systems.

It would probably be best to wait until fix software is available from the maker of your computer or from the maker of your add-in wireless card, if you use one. In the meantime, it's a good idea to turn off wireless when you are not actually using it. You're likely to notice if someone tries to take over your computer while you are actually working on it, but these attacks will work on a computer sitting idle, even if it is not logged in to a wireless access point.

For more information about this big issue click at the 'Source' Link


Previous
Next
Nvidia Reveal $18,000 PC Graphics Card        All News        Logitech Announces New Notebook Peripherals Line
Intel Teams with Top Universities for Software-Related Research     General Computing News      Google in Payment Deal with Associated Press

Source Link Get RSS feed Easy Print E-Mail this Message

Related News
Sony Joins Forces with Cogitai to Conduct Research and Development for Artificial Intelligence
Brian Krzanich Outlines Intel's Future Strategy
Microsoft Positions Windows 10 As A Platform for the Intelligence Revolution
Intel To Axe 12,000 Jobs, Focuses On Cloud And Smart, Connected Computing Devicess
Intel Outlines Next Generation of Experiences At 2016 Intel Developers Forum Shenzhen
Intel Packs Altera Arria 10 FPGAs With Xeon E5-2600 v4 Processors
Intel Senior Executives Leaving Company
Intel Introduces Xeon Processor E5-2600 v4 And Its First 3D NAND SSDs
Chinese AI Team To Challenge Google's AlphaGo
Intel To Break From Typical Two-year CPU Release Cycle
New Intel NUC "Skull Canyon" Comes To Change the Game
Google Artificial Intelligence Program Wins Final Game In Go Tournament

Most Popular News
 
Home | News | All News | Reviews | Articles | Guides | Download | Expert Area | Forum | Site Info
Site best viewed at 1024x768+ - CDRINFO.COM 1998-2016 - All rights reserved -
Privacy policy - Contact Us .