Category Archives: Security

Researchers Seek Answers To Wi-Fi Zombies

Are Wi-Fi freeloaders reality or myth? Can the image of Wi-Fi zombies connected to the Internet, yet disconnected from their neighbor, be reversed? Faced with headlines questioning the wisdom of free Wi-Fi hotspots, two researchers are on a quest to reshape the image of Wi-Fi users. Via [wi-fiplanet.com]Continue Reading

Detector Is Security Alternative To Wi-Fi

Researchers at the University of Oxford have developed an optical line-of-sight LAN using CMOS transmitters and receivers and resonant cavity LEDs. Via [electronicsweekly.com]Continue Reading

Hackers Annihilate Wi-Fi Record

A group of young hackers who broke a world record for Wi-Fi connectivity last year can expect to hear from the Guinness folks again. Via [wired.com]Continue Reading

Have WiFi Adapter, Will Map

Even today, after devoting an entire month of his life to researching the subject, as well as several more weeks to analyzing the resulting data and then organizing it on a multicolored map that rivals any in a military situation room, Ofir Gal-Mor, 32, of Ramat Hasharon, still has no explanation for the mapping bugContinue Reading

NASD Warns About Wi-Fi

Investors and traders should protect themselves when using wireless networks, cautions financial industry regulator. Via [redherring.com]Continue Reading

Waking Up To Warjacking

Have you ever hopped onto a stranger’s unsecured Wi-Fi connection? If so, you’re not alone. Via [internetnews.com]Continue Reading

Feds Want To Tap In-Flight Internet Communications

Online WiFi service was first tested in 2003 by Boeing aboard a Lufthansa flight from Germany, and United Airlines was the first American carrier to move forward with in-flight WiFi. On board, the planes are equipped with wireless routers, making them WiFi hotspots, like a coffee house or a copy shop on the ground. ViaContinue Reading

Opinion: “Stealing” Wi-Fi Is No Crime

Authorities recently arrested a Florida man for “borrowing” his neighbor’s Wi-Fi. But who was harmed? Via [informationweek.com]Continue Reading

Trapeze Beefs Up Security On MSS Platform

WLAN switch vendor Trapeze Networks Inc has bolstered the security features on its Mobility System Software platform to include detection of RF intrusion and DoS attacks, as well as packet capture and monitoring. Via [cbronline.com]Continue Reading

Man Arrested For Accessing Wi-Fi Network

A man who allegedly accessed a home Wi-Fi network in St. Petersburg, Florida, from a parked car got logged off the hard way: He was arrested and charged with a felony. Via [pcworld.com]Continue Reading

E911 Gets Wi-Fi Assist

When the Federal Communications Commission (FCC) said in May that all VoIP providers must provide 911 emergency call services with the same features as wireless carriers—including caller location information—one question remained: how? The FCC didn’t mandate how to do it, it just said to get it done. Via [wi-fiplanet.com]Continue Reading

Wi-Fi Watchdog 5.0 Tracks Wi-Fi Users By Location

Newbury Networks says its Wi-Fi Watchdog 5.0 can precisely locate–and block–unauthorized users trying to enter networks. Via [informationweek.com]Continue Reading

Campus Wi-Fi Network Keeps Costs Low, Security High

Like many admins, Rodney Kluever recently faced a daunting task: find a way to use Wi-Fi to satisfy the connectivity requirements of a distributed organization while ensuring his expansive network stayed safe. Via [searchsecurity.techtarget.com]Continue Reading

Wi-Fi Security Wakes Up To Reality

If a company can’t migrate to AES encryption, which requires faster processors in the access point, then the company should consider using a virtual private network (VPN) in house for its Wi-Fi network, says Roger Sands, vice president of enterprise development at Colubris Networks. Via [newsfactor.com]Continue Reading

Feds Beset By Wireless Security Problems

Federal agencies are acquiring wireless technology almost by accident by failing to track government-issued laptops and other mobile devices and therefore applying inadequate safeguards to secure them. One result: signal leakage. Via [searchmobilecomputing.techtarget.com]Continue Reading