+39 02 8718 8553 sales@tanaza.com

SMS authentication to verify phone numbers

The Tanaza splash page features now a new type of authentication: mobile number authentication, with verification through sms token.

Tanaza is seamlessly integrated with an SMS gateway that sends automatically a text message when the user submits his mobile number. This simple but effective verification system guarantees that there are no fake numbers in your wi-fi clients’ database.

How to use this authentication method >>

UW Backscatter tag enables Wi-Fi connectivity for battery-free devices

 

Consider how convenient it would be for everyday battery-free devices to have similar functions to the Wi-Fi enabled shelf devices used regularly, like smartphones and laptops.

Consider how convenient it would for everyday battery-free devices to have similar functions to the Wi-Fi enabled shelf devices used regularly, like smartphones and laptops... WI-FI BACKSCATTER

By powering battery-free devices with an embedded sensor that absorbs signals from the surrounding Wi-Fi infrastructure, passive devices are activated with a Low-WiFi “carrier wave” that allows them to communicate, track activity and store information without altering its hardware.  (more…)

Vulnerabilities in Netgear and D-Link wireless hardware

 

Thanks to FIRMADYNE, an open-source framework that runs security tests on embedded firmware, researchers have found new and existing vulnerabilities in Netgear and D-Link wireless hardware.

Thanks to FIRMADYNE, an open-source framework that runs security tests on embedded firmware, researchers have found new and existing vulnerabilities in Netgear and D-Link wireless hardware. - Netgear WN604Netgear WN604

FIRMADYNE is an open-source framework created by Boston University students as part of a research project designed to detect vulnerabilities by performing a security analysis of Linux-based embedded devices. Using this framework, researchers were able to perform security tests on 42 embedded device manufacturers and they analyzed approximately 23,000 firmware images. This resulted in the discovery of a total 887 images, of the 9,486 extracted, with vulnerabilities to at least one of the 74 known exploits. Additionally, researchers also found 14 formerly undetected vulnerabilities in 69 firmware images used by 12 products. (more…)