Category Archives: Security

Home WLAN Security: The Next Generation

The wireless security technology called Wi-Fi Protected Access (WPA) is a big improvement-especially as a replacement to the crippled wired equivalent privacy (WEP)-but all wireless security schemes share a problem: they’re still hard to set up — or, at least, they’re hard for non-techie types. Via [wi-fiplanet.com]Continue Reading

Companies Team To Enable Push-button Security In WiFi Nets

Broadcom has teamed up with Linksys and Hewlett-Packard to bring push-button security capabilities to WiFi networks. Via [commsdesign.com]Continue Reading

Startup Markets Wireless-Security Paint

Tiny Force Field Wireless is selling paint laced with aluminum and copper that it claims will keep wireless-network traffic within company walls. Via [informationweek.com]Continue Reading

Second Hardware Hacker Gets 26 Months’ Prison

A second man has been convicted in the trial that saw a 21-year-old sentenced to the longest ever prison term for a hacking conviction. Via [management.silicon.com]Continue Reading

‘Phishing’ Hooks Wi-Fi Networks

Lori-Lee Savage was shocked on a recent Christmas shopping trip when her debit card was rejected for insufficient funds. Via [business.bostonherald.com]Continue Reading

Michigan Hacker Who Tapped Into Hardware Chain’s Computers Gets 9 Years

One of three Michigan men who hacked into the national computer system of Lowe’s hardware stores and tried to steal customers’ credit card information was sentenced Wednesday to nine years in federal prison. Via [freep.com]Continue Reading

Tunable Surfaces Prevent Wi-Fi Leaks

Last year a man in Canada was arrested for downloading child pornography onto his laptop, but he used someone else’s wireless access point to access the illegal material. That same year federal officials accused a man from Michigan of conspiring to steal credit card numbers from the Lowe’s chain of home improvement stores by takingContinue Reading

Vendors Push Wi-Fi Intrusion Detection

As the popularity of wireless local-area networks (LANs) continues to grow, vendors are adopting various approaches to help commercial and government systems sniff out and detect hackers and rogue wireless access points. Via [fcw.com]Continue Reading

Wi-Fi Detection And Analysis Tool Hits Market

“As Wi-Fi users become accustomed to using high-speed Internet access when and where they need it, versatile tools for finding accessible Wi-Fi networks become essential,” Canary Wireless co-founder Benjamin Kern said. John Yunker, an analyst at Byte Level Research, said that the features on the Canary Wireless Hotspotter device represent a big step forward. ViaContinue Reading

Wireless Attacks Primer

In general, attacks on wireless networks fall into four basic categories: passive attacks, active attacks, man-in-the middle attacks, and jamming attacks. Lets review what these attacks mean on a wireless network. Via [netsecurity.about.com]Continue Reading

BelAir Extends Wireless Mesh Network Security

BelAir Networks has released three new products designed to extend the reach, capacity, and security of Wide Area Wi-Fi networks and wireless mesh networks. Via [commsdesign.com]Continue Reading

Wi-Fi Company Homes In On Wireless-LAN Security

Wibhu Technologies Inc., a Wi-Fi network infrastructure company founded in Pune, India, has renamed itself AirTight Networks Inc. and brought in David King as its new chairman and chief executive officer. Via [commsdesign.com]Continue Reading

New Tools Aim To Lock Up Wireless Networks

AirTight gets funding to launch wireless-LAN firewall, and Air Defense will role out security software. Via [informationweek.com]Continue Reading

Cisco, Symbol Keep Wireless Data Safe

Security partnerships and technology advances are making it increasingly safer to keep corporate data up in the air. Via [eweek.com]Continue Reading

UK Firms Wide Open To Wireless Attack

Most large UK companies are leaving their networks open to attack by failing to take wireless security seriously, newly released research has claimed. Via [vnunet.com]Continue Reading