Category: RouterCheck

RouterCheck responds to the Deutsche Telekom problem

In light of the recent events involving the compromised routers in the Deutsche Telekom network, RouterCheck will now check for some of the indications that a router may be vulnerable to similar attacks. Earlier this week, close to 1,000,000 Deutsche Telekom customers were knocked off the internet when hackers began to attack their routers. Starting today, […]

It’s Time to Demand Accountability of Android Apps’ Permissions

Today is Safer Internet Day, so it’s a good time to think about how we can all be safer while online. When talking about online safety, we typically think of being more secure and having our privacy maintained and respected. We have always been concerned by the design of Android’s Permissions system and its limitations. Unfortunately, the original Permissions design […]

Enter Our Contest!

In support of Data Privacy Day, RouterCheck is sponsoring a contest to increase awareness of the importance of privacy and protecting personal information. The theme of the contest is Home network security is critical to keeping your data private. You may enter our contest as many times as you wish.  Winning entries can win the following prizes: […]

Tracing the Cause of the Home Router Problem

If you’ve been following this website and blog you’ll know that it’s filled with information about vulnerabilities and other security problems in home routers. But how did we ever get ourselves into this position? It certainly doesn’t need to be this way. Why is home networking equipment so problematic? Instead of answering the question we’ll just […]

RouterCheck Detects the Netgear Authentication Bypass

RouterCheck now detects the Netgear Authentication Bypass problem that was disclosed several days ago by Compass Security Schweiz Ltd. This is a serious problem that allows hackers to gain access to a router’s administration functionality without having to login. Several thousands of routers are believed to have been affected by a targeted attack against this vulnerability. […]