The Defense Department’s new wireless fidelity policy seeks help from many of its agencies to ensure their employees and contractors use caution when operating wireless computer devices at military installations. Via [fcw.com]… Continue Reading
The Defense Department’s new wireless fidelity policy seeks help from many of its agencies to ensure their employees and contractors use caution when operating wireless computer devices at military installations. Via [fcw.com]… Continue Reading
A parking cop approaches a BMW 318i at a meter that expired just five minutes ago. She takes a handheld computer, connected to a wireless-fidelity (WiFi) network, and scans the bar code on the car’s registration sticker. The ownership information is captured instantly and the cop transmits an electronic version of the form to a… Continue Reading
The rogue access point creates many problems for IT professionals. Whether good intentioned or not, users can create a real security nightmare when they attempt to piggyback onto your network. Via [techrepublic.com.com]… Continue Reading
Wireless network protection neglected by more than half of UK businesses. Via [vnunet.com]… Continue Reading
Wireless networks aren’t just popular with computer users on the go. Hackers are finding them an easy target to snoop on consumers’ laptop PCs and, eventually, their employers’ networks. Via [forbes.com]… Continue Reading
Cisco is warning customers about a security hole in two products used to manage wireless LANs and e-business services in corporate data centers. Via [nwfusion.com]… Continue Reading
Cutting the price of Wi-Fi will not encourage more people to use it, claimed BT Group head of Wi-Fi Chris Clark. Via [computerweekly.com]… Continue Reading
Anyone can get their kicks on Route 66 — but on Highway 101, you can get Wi-Fi in 77 places. Via [usatoday.com]… Continue Reading
From hot spots in McDonald’s to the newly proposed hot zones showing up in town squares in municipalities around the country, wireless access seems more and more pervasive – or at least the perception is that wireless is pervasive. In reality, CIOs, CSOs (Chief Security Officers) and network administrators are struggling to implement enterprise wireless… Continue Reading
Tatara Systems says that the company’s SIM-based Wi-Fi authentication, roaming and service delivery solutions have been proven in a real-world environment. Tatara’s SIM-based authentication solutions facilitate easier authentication and delivery of enhanced services to wireless users roaming between wireless local area networks (LANs) and wireless wide area networks (WANs). Via [cellular-news.com]… Continue Reading
Wireless networking has rapidly become the new way to upgrade systems and networks. It offers freedom of movement and flexibility in changing enterprise environments. Unfortunately, when the 802.11 protocol was developed, little thought went towards security. What security was applied — specifically WEP — was quickly broken. Today, it’s widely recognized that WEP provides little… Continue Reading
Network Computing examines tools from major vendors for keeping a wireless LAN secure after it’s built. The tools watch out for rogue access points and denial-of-service attacks and perform other tasks to keep attackers at bay. Via [securitypipeline.com]… Continue Reading
A jerk lurking at a hotspot with a public domain sniffer can potentially gain access to all manner of confidential information, including the assets on your enterprise’s network. For many users, HotSpotVPN is a viable security solution. Via [internetweek.com]… Continue Reading
According to a top Gartner analyst, when companies are developing their wireless security strategies, they need to consider far more than whether to deploy Wi-Fi Protected Access (WPA) or other out-of-the-box security fixes. Via [searchnetworking.techtarget.com]… Continue Reading
The Trouble With Wireless
Today’s wireless networks are incredibly easy to set up and use—maybe too easy. Even when the most experienced PC users install Wi-Fi cards and access points, they don’t always take proper security measures, and many networks are left wide open to attack. Via [pcmag.com]… Continue Reading