AirMagnet is taking intrusion detection and prevention a step further in the wireless local area network market with a new version of its software that can block and disable rogue users. Via [news.com.com]… Continue Reading
AirMagnet is taking intrusion detection and prevention a step further in the wireless local area network market with a new version of its software that can block and disable rogue users. Via [news.com.com]… Continue Reading
Instead of linking users to physical ports for authentication, security and management, Trapeze focuses on user identities and transfers user attributes from one Mobility Exchange to another as the user roams the network. Via [newsfactor.com]… Continue Reading
These tips and info tell you what you need to know to set up your wireless network. Via [pcworld.com]… Continue Reading
A couple of days ago the WI-FI Alliance finally announced that after almost one year of detailed testing, more than 175 products from some of the leading wireless manufacturers, received WPA certifications. The majority of wireless users won’t immediately buy the new hardware, so they are stuck with the equipment they are currently using. The… Continue Reading
Many wireless protocols are open to “man-in-the middle” attacks which could allow the voting results to be changed by an intruder pretending to be a voting machine. Recently we have seen that the part of 802.1x, the replacement for WEP was vulnerable to this kind of an attack if not properly implemented.… Continue Reading
Vernier Networks Inc. today announced the availability of an updated version of its wireless LAN security and management platform. The product is designed to help organizations manage increasingly complex Wi-Fi networks and curb the threats posed by worms and viruses. Via [searchnetworking.techtarget.com]… Continue Reading
The Wi-Fi Alliance has announced plans to upgrade the security capabilities in a new version of its industry-standard Wi-Fi Protected Access (WPA) protocol due for release later this year. Via [internetnews.com]… Continue Reading
The security of wireless networks used by businesses in London has improved significantly over the last 12 months, says a survey. Via [news.bbc.co.uk]… Continue Reading
Regardless of the amount of Wi-Fi security infrastructure, end-users often are the weakest link, because they can be fooled or coerced into giving up user IDs, passwords and WEP keys. Consequently, organizations need to create and, more importantly, enforce security policies. Via [newsfactor.com]… Continue Reading
Wi-Fi security is complicated, and it takes a lot of work to implement it right. If not done correctly, WPA and WEP may work on your device but will not interoperate with others. Via [enterprise-security-today.newsfactor.com]… Continue Reading
You’ve heard of a drive-by shooting, but maybe not drive-by hacking. It’s a worrisome sort of cybercrime in which burglars sit in a car outside a company and use laptop computers with antennas to hack into cash registers and corporate records by snagging data as they travel over the airwaves. Via [businessweek.com]… Continue Reading
In apartment complexes, dormitories and neighborhoods, people are using Wi-Fi technology to set up communal wireless networks with friends. The process allows multiple users to take advantage of one high-speed broadband Internet connection, sparing many from shelling out the extra bucks for a connection of their own. Via [deseretnews.com]… Continue Reading
Wireless security is one of the hottest topics in our business. In the article you are just reading, I’ve tried to cover some of the most interesting wireless security topics and events in 2003. The article is divided into several thematical sections: general overview of the wireless security happenings, look back on some software tools,… Continue Reading
A behind-the-scenes security war raged at a recent Wi-Fi trade show, according to a company that provides wireless LAN security monitoring products. Via [crn.com]… Continue Reading
Wireless Honeypot Trickery
Wireless technologies have spread quickly in recent years and are now widely deployed in corporate environments as well as at home. The human dependency on those technologies has increased to the point where one can find wireless devices almost everywhere, from network devices to laptops, cameras, and so on. Via [securityfocus.com]… Continue Reading