
Sign up to save your podcasts
Or


James T Keating, Vice President of Product Strategy at Zimperium based in the United States, participates in Risk Roundup to discuss “The Weaponization of Wi-Fi.”
The Weaponization of Wi-Fi
Over the years, the fear of the potential misuse of wireless technologies as a covert weapon system is becoming very real. The reason behind that is if the wireless technologies can be used for cyber-attacks in different sizes, shapes, and forms, can monitor any individuals heart rate, synchronize and alter a heart rhythm, then with specific modification, it could very well be used to alter brain waves in humans or any other living species and thereby change its behavior or other anatomical functions.
Since the backbone of the internet, the infrastructure of the
Manipulating Wi-Fi
It is said that depending on how our internet traffic passes through and which country it passes through determines the vulnerability of weaponization. It is, therefore, important to understand what role each country’s digital infrastructure plays in the weaponization of the internet.
The time is now to evaluate the risks of the weaponization of Wi-Fi!
For more, please watch the Risk Roundup Webcast or hear the Risk Roundup Podcast
About the Guest
James T Keating is the Vice President of
About the Host of Risk Roundup
Jayshree Pandya (née Bhatt), the founder and
About Risk Roundup
Risk Roundup, a global initiative launched by
About Risk Group
Risk Group LLC is a leading strategic security
Copyright Risk
The post The Weaponization Of Wi-Fi appeared first on Risk Group.
By Risk Group4
44 ratings
James T Keating, Vice President of Product Strategy at Zimperium based in the United States, participates in Risk Roundup to discuss “The Weaponization of Wi-Fi.”
The Weaponization of Wi-Fi
Over the years, the fear of the potential misuse of wireless technologies as a covert weapon system is becoming very real. The reason behind that is if the wireless technologies can be used for cyber-attacks in different sizes, shapes, and forms, can monitor any individuals heart rate, synchronize and alter a heart rhythm, then with specific modification, it could very well be used to alter brain waves in humans or any other living species and thereby change its behavior or other anatomical functions.
Since the backbone of the internet, the infrastructure of the
Manipulating Wi-Fi
It is said that depending on how our internet traffic passes through and which country it passes through determines the vulnerability of weaponization. It is, therefore, important to understand what role each country’s digital infrastructure plays in the weaponization of the internet.
The time is now to evaluate the risks of the weaponization of Wi-Fi!
For more, please watch the Risk Roundup Webcast or hear the Risk Roundup Podcast
About the Guest
James T Keating is the Vice President of
About the Host of Risk Roundup
Jayshree Pandya (née Bhatt), the founder and
About Risk Roundup
Risk Roundup, a global initiative launched by
About Risk Group
Risk Group LLC is a leading strategic security
Copyright Risk
The post The Weaponization Of Wi-Fi appeared first on Risk Group.