The 4th Annual Worldwide Wardrive is under way this week, with volunteers scanning the airwaves in a neighborhood near you for WLAN access points. Via [nwfusion.com]… Continue Reading
The 4th Annual Worldwide Wardrive is under way this week, with volunteers scanning the airwaves in a neighborhood near you for WLAN access points. Via [nwfusion.com]… Continue Reading
How often could you use an extra eye on something important? Security cameras are built for just such a task, but they can be costly and difficult to install because they usually require a hardwired connection. Via [forbes.com]… Continue Reading
The escalating use of wireless technology demands formal corporate security policies governing that use, according to users and analysts at a Gartner Inc. security conference here this week. Via [computerworld.com]… Continue Reading
Operations Support System (OSS) provider Pronto Networks of Pleasanton, Calif., has teamed up with Sweet Spot Solutions of Mesa, Ariz., to make a key to the Internet. Literally. Via [wi-fiplanet.com]… Continue Reading
Greedy computer hackers using open-source Linux machines could steal more than their fair share of bandwidth from Wi-Fi hotspots, Swiss computer scientists have warned. Via [newscientist.com]… Continue Reading
Interlink Networks rolled out Monday a software-based wireless security product that aims to bring high-end enterprise security to small businesses in a setup that’s as easy to configure as security codes in a garage door opener. Via [eweek.com]… Continue Reading
In a rare wireless hacking conviction, a Michigan man entered a guilty plea Friday in federal court in Charlotte, North Carolina for his role in a scheme to steal credit card numbers from the Lowe’s chain of home improvement stores by taking advantage of an unsecured wi-fi network at a store in suburban Detroit. Via… Continue Reading
The very idea of a wireless network introduces multiple venues for attack and penetration that are either much more difficult or completely impossible to execute with a standard, wired network. Wireless networks only know the boundaries of their own signal: streets, parks, nearby buildings, and cars all offer a virtual “port” into your wireless network.… Continue Reading
Today, wireless networks are everywhere — at Starbucks, Burger King, airports, and so forth — and all provide wireless Internet access (for a fee). Finding commercial wireless operators is easy; very often, you’ll see signage hanging outside a coffee house or on the walls of a hotel lobby. If not, when you power up your… Continue Reading
A security bypass flaw in a popular wireless broadband router shipped by Cisco’s Linksys unit could give malicious hackers administrative access to vulnerable devices, researchers warned on Wednesday. Via [internetnews.com]… Continue Reading
Laptops and mobile devices that access the corporate network behind the perimeter firewall have IT staffs scrambling to combat malicious threats introduced in a way that evades perimeter security measures. As the network perimeter dissolves, IT administrators must find solutions that provide granular access controls and capable zero-day worm defenses that are appropriate and manageable… Continue Reading
The product is designed to help address many of the management and security issues; the University of Arkansas at Pine Bluff and Universal Heath Services are among the beta testers. Via [informationweek.com]… Continue Reading
Information technology managers last week said a denial-of-service vulnerability that affects some Wi-Fi wireless LANs could force companies to develop new skills and rethink the way their networks are set up. Via [computerworld.com]… Continue Reading
Games IT chiefs opt for wide area and IP-based networks as security fears KO Wi-Fi. Via [vnunet.com]… Continue Reading
Wireless Attacks And Penetration Testing (Part 2 Of 3)
There are several techniques to performing penetration testing on your wireless network, the objective of all of them being to improve the security and integrity of the network itself. What wireless lacks in the security of the physical layer and medium must be compensated for in protections on other layers of the stack. Via [securityfocus.com]… Continue Reading