close-bbt

news fly out

×HOMEBlack HistoryBusiness & FinanceEducationEntertainmentFaith & FamilyFood & TravelHBCUHealthNewsLove & RelationshipsOther NewsTechnology
Home

  • Business
  • Entertainment
  • Food & Travel
  • Health
  • News
  • Politics
  • Technology
  • Publishers

Latest News

Your Router May Be the Front Door Hackers Are Trying to Open

6h

Most of us think about our phones, laptops, tablets, and smart TVs when we think about cybersecurity. But the latest warning from U.S. and U.K. cybersecurity agencies reminds us that one of the most important devices in our homes and small offices is also one of the easiest to forget: the home Internet router.

In early April, the National Security Agency (NSA) announced its support for an FBI public service announcement warning that Russian military intelligence cyber actors have been exploiting vulnerable small-office and home-office routers. According to the NSA,  the DOJ, FBI, and international law enforcement partners recently disrupted a network of compromised routers used in malicious hijacking operations. The warning is aimed not only at government and business networks, but also at everyday router owners whose devices may be outdated, poorly configured, or no longer supported by the manufacturer. 

Sign up for our free newsletter.

Sign up

In plain terms, attackers have been changing router settings so that Internet traffic can be redirected through attacker-controlled systems. This is known as DNS hijacking. DNS is like the Internet’s address book. When you type in a website name, DNS helps your device find the correct destination. If criminals tamper with those settings, you may think you are going to a legitimate website, but your traffic may be routed through systems designed to steal passwords, authentication tokens, or other sensitive information. 

@media ( min-width: 300px ){.newspack_global_ad.scaip-1{min-height: 100px;}}@media ( min-width: 728px ){.newspack_global_ad.scaip-1{min-height: 90px;}}

This is important because the router is the gateway between your home or small office and the Internet. If it is compromised, attackers may be able to spy on traffic, redirect users to fake sites, harvest login credentials, or use the device as part of a larger criminal network. The National Cybersecurity Alliance compares router security to protecting the front door of your digital life. A strong user password helps, but if the router itself is weak, the whole household or office may be exposed. 

Here are the important protective steps to take to address this security issue:

Reboot your router. The NSA and FBI recommend unplugging the router, waiting 30 seconds to a minute, and plugging it back in. Rebooting is not a complete fix, but it can disrupt some malicious activity and clear temporary connections that attackers may be using. It is especially important if you have not updated your router recently. Update your router’s firmware. Firmware is the software that runs the router. Just as phones and computers receive updates, routers need updates to fix security holes. Log in to your router’s app or administration page and look for firmware or software updates. If automatic updates are available, turn them on. Cybercriminals often look for devices that are behind on updates because known flaws are easier to exploit. Change the default username and password. Many routers are shipped with generic login credentials such as “admin” or “default.” These credentials may be printed in manuals or posted online. If the router still uses its original password, it is much easier for an attacker to gain access. Use a long, unique password of at least 16 characters and store it in a password manager. Note that this is different from your Wi-Fi password. It’s the password used to manage the router’s settings. Disable remote management. Some routers allow the owner to log in from anywhere on the internet. While that may sound convenient, it can create an open door for attackers. Unless you truly need it, turn off “remote access,” “remote administration,” or “remote management” in the router settings. The NSA specifically encourages users to disable remote management interfaces from the internet. Replace routers that are “end of life” or “end of support.” When a manufacturer stops supporting a router, that device may no longer receive security updates. That means any discovered flaw may remain permanently unpatched. Any Internet-facing edge devices, including routers, firewalls, switches, wireless access points, and similar equipment, create serious risk when they are no longer supported. This means that even for homes, churches, nonprofits, and small businesses, unsupported equipment should be identified and replaced. 

For people who work from home, the warning has an added layer of urgency. The NSA advises organizations with telework arrangements to review how employees access sensitive data, including the use of VPNs or hardened applications. A weak home router can become a weak link between a worker and an employer’s systems. 

@media ( min-width: 300px ){.newspack_global_ad.scaip-2{min-height: 100px;}}@media ( min-width: 728px ){.newspack_global_ad.scaip-2{min-height: 90px;}}

The latest router warning should not cause panic, but it should prompt action. Taking the above steps may take only a few minutes, and goes a long way to closing the digital front door before someone else walks through it.

Karen Clay, Clay Technology and MultimediaCourtesy, Karen ClayKaren ClayClick Here to See More posts by this AuthorBio ⮌document.addEventListener('DOMContentLoaded',function(){document.addEventListener('click',function(event){const target=event.target.closest('.m-a-box-data-toggle');if(target){event.preventDefault();let authorBox=target.closest('.m-a-box');if(authorBox.getAttribute('data-multiauthor')){authorBox=target.closest('[data-author-ref]')}if(authorBox){const postLabel=target.querySelector('.m-a-box-string-more-posts');const bioLabel=target.querySelector('.m-a-box-string-bio');if(postLabel.style.display==="none"){postLabel.style.display="inline";bioLabel.style.display="none"}else{postLabel.style.display="none";bioLabel.style.display="inline"}const bio=authorBox.querySelector('.m-a-box-bio');const related=authorBox.querySelector('.m-a-box-related-entries');if(related.style.display==="none"){related.style.display="block";bio.style.display="none"}else{related.style.display="none";bio.style.display="block"}}}})});Karen ClayDon’t Be a Pig!Karen ClayBrowser Fingerprinting: The Tracking You Don’t SeeKaren ClayThree Women ‘Guardians of the Grid’ in the DMV RegionKaren ClayThe Case for the Increased Presence of Women in Cybersecurity

You May Also Like


Trending Topics

Install the app today!

ap_store.pngApp

Get in touch with us

Reach out to the Hayti team about
collaborating or working together.

CONTACTinfo@hayti.com
hayti_logo.png
Company
  • Press & Media
  • Contact Us
Partners
  • Publishers
  • Podcasters
Terms and Policies
  • Terms for Publishers
  • Terms for Podcasters
Stay Connected
  • BOMESI-badge_WH1.png

© 2026 Hayti LLC. All rights reserved.

  • Privacy Policy.
  • Terms of Use.