Enhance cybersecurity awareness and survivability for DoD, industry partners, and academia in the face of the ever-increasing threat of cyber attacks. Cybersecurity (CS) includes managing risks related to the use, processing, storage, and transmission of information and the systems and processes used for those purposes, including analog and physical form. CS includes information availability, identification and authentication, confidentiality, integrity, and non-repudiation as well as the economic considerations with respect to selection of CS techniques, CS processes, and industry trends.
4G Router Vulnerabilities Let Attackers Take Full Control
- This topic has 0 replies, 1 voice, and was last updated 1 year, 7 months ago by .
Security researcher ‘G Richter’ from the Pen Test Partners shared flaws in 4G routers during the DEF CON this year. Critical, remotely-executable vulnerabilities were found in routers from ZTE, Netgear and TP-LINK. There are multiple vulnerabilities that were found in each type of router, and if exploited, they can allow take-over of the routers.
You must be logged in to reply to this topic.