Security Information and Review

Collection of security information and review

Archive for the 'device security' Category

The Latest Linksys WAP4400N Vulnerability

Author : Admin

Linksys WAP4400N uses the draft version of the upcoming 802.11n standard that is claimed with data transfer rate 300 Mbps. This access point has full feature such support HTTP/HTTPS protocol, SNMP v1, SNMP v2c or SNMP v3 and work at frequency 2.4 GHz. Others feature in this machine : DHCP support, load balancing, syslog, MAC filtering and others, support WPA, WPA2, WPA-PSK, 64-bit WEP and 128-bit WEP algorithm. Get more detail about this product at Cisco / Linksys web site.

The latest Linksys WAP4400N vulnerability was discovered. … continue reading : The Latest Linksys WAP4400N Vulnerability.

15 November 2009 at 23:13 - Comments

2Wire Gateway Password Reset Vulnerability

Author : Admin

In August 11, 2009, a vulnerability have been reported in 2Wire Modem Gateway. There is an authentication bypass vulnerability in the web administration that allow an attacker to set new password even if the password was previously set.


2Wire is the leading provider of intelligent service delivery platforms for the DSL broadband market. Its flagship products include the award-winning HomePortal residential gateways, the first to allow broadband subscribers to connect to the high-speed Internet with an integrated DSL modem, … continue reading : 2Wire Gateway Password Reset Vulnerability.

13 August 2009 at 04:23 - Comments

iPhone and iPod : Full feature and multiple vulnerabilities

Author : Admin

iPhone is a device designed and marketed by Apple Inc. It’s an internet-connected and multimedia smartphone with minimal hardware interface such keyboard but use touch screen to renders a virtual keyboard. iPhone is full feature smartphone, as a camera phone, a portable media player and can be an internet client with application like e-mail, web browsing and WIFI connectivity.


iPod was first launched on October 23, 2001, a brand of a portable media players designed and marketed by Apple Inc. Latest generation of the iPod use touchscreen technology was called iPod Touch, can play several audio file formats including MP3, AAC/M4A, WAV, Apple Lossless and other audio formats. The iPod Photo introduced the ability to display JPEG, BMP, GIF, TIFF and PNG image file formats.


iPhone and iPod touch use Apple iPhone OS to operate this device and multiple vulnerabilities have indentified which could be exploited by attackers to bypass security restrictions, gain knowledge of sensitive information, cause a denial of service or compromise vulnerable system. Vulnerabilities was reported by the vendor and others organization like secunia, Google Inc, affected Apple iPhone and iPod touch prior to version 3.0.

… continue reading : iPhone and iPod : Full feature and multiple vulnerabilities.

22 June 2009 at 12:05 - Comments

Linksys WAG54G2 feature and vulnerability

Author : Admin

Linksys, a division of Cisco System Inc., is the recognized global leader in VOIP, Wireless and Ethernet networking for home and SOHO ( small office home office ). Linksys headquartedred in Irvine, California, has been acquired by Cisco system, Inc in June 2003.


One of famous product Linksys is WAG54G2, provides ADSL / WIFI / Ethernet interfaces with base on a Linux distribution which run on ARM architecture. The ARM family accounts for approximately 90% of all embedded 32-bit RISC CPU as of April 2009. It’s found in most corners of consumer electronics, from portable devices like PDA, mobil phone, iPods and other digital media and music players to computer peripherials such hard drives, desktop and routers.


… continue reading : Linksys WAG54G2 feature and vulnerability.

18 June 2009 at 11:09 - Comments