November 07, 2011 Added by:Headlines
The NIST has issued two new guides addressing issues with wireless security. The first guide focuses on Bluetooth security, while the second looks at wireless local area networks. The NIST is seeking public comment on the guides via email with a November 10th cutoff for submissions...
November 04, 2011 Added by:Bill Gerneglia
Small and medium businesses are increasingly more mobile as their employees are demanding increased access from both the home and the road like never before. SMBs face a wide range of challenges when it comes to providing this access for these mobile workforces...
October 15, 2011 Added by:Spencer McIntyre
EAPeak is a suite of open source tools to facilitate auditing of wireless networks that utilize the Extensible Authentication Protocol framework for authentication. It provides useful information relating to the security of these networks for PenTesters to use in searching for vulnerabilities...
October 09, 2011 Added by:Kyle Young
If the victim computers are part of a Windows domain and have wireless NICs, by automating Metasploit with a pass-the-hash attack and using my script, one could essentially automate deploying a series of rogue ap points throughout a domain. This would be kind of like a network worm...
October 06, 2011 Added by:Headlines
"The government can use location information over time to learn where you go to church, what sort of doctors you go to, what meetings and activities you participate in, and much more. Police should not have blanket permission to install GPS devices and collect detailed information..."
September 12, 2011 Added by:Stephen Gantz
A recent New York Times article calls United States v. Jones "the most important 4th Amendment case in a decade" and invokes comparisons of the government's efforts to use comprehensive surveillance technologies to the "Big Brother" state described in George Orwell's 1984...
September 01, 2011 Added by:Headlines
"The Windows Mobile operating system is clearly sending information that can lead to accurate location information of the mobile device regardless of whether the user allowed it," said Kamkar, who provided the analysis of the tracking methods for Lawyers seeking to establish a class action lawsuit...
August 12, 2011 Added by:Robert Siciliano
In Minnesota prosecutors put away a “depraved criminal” for 18 years as a result of virtually torturing his neighbors via their Wi-Fi connection. After a brief encounter with his new neighbors he began “a calculated campaign to terrorize his neighbors”...
August 01, 2011 Added by:Headlines
"WASP is equipped with the tools to crack Wi-Fi network passwords made possible by an on-board VIA EPIA Pico-ITX PC running BackTrack Linux equipped with 32GB of storage to record information. WASP can also act as a GSM network antenna meaning it will be able to eavesdrop on calls/text messages..."
May 16, 2011 Added by:Mark Bennett
Many people believe that their wireless is secure because they are using WPA. Well we did a test recently and were able to basically password guess our way with a dictionary attack using either a straight dictionary or a rainbow table. Using linux this is how it is done...
April 26, 2011 Added by:Headlines
"This is all very alarming. It means that literally millions of people who use Wi-Fi in public could be at risk. If criminals are able to harvest the usernames and passwords of all the websites you visit, they could do significant damage in terms of identity theft and fraud..."
April 20, 2011 Added by:Headlines
The court of appeals’ decision seriously impedes the government’s use of GPS devices at the beginning of an investigation when officers are gathering evidence to establish probable cause and provides no guidance on the circumstances under which officers must obtain a warrant...
April 07, 2011 Added by:Headlines
The U.S. Court of Appeals for the Ninth Circuit has ruled that electronic devices may be seized at the border, confiscated, searched, and even transported to a separate facility for forensic examination - all without need for a warrant demonstrating of due cause...
April 06, 2011 Added by:Wayde York
I was playing with an application to spoof incoming caller ids on my Android-based phone and was attempting to fool my nephew with a crank call. Turns out, when I called his phone with his own number as the spoofed caller id, it went straight into his voice mail controls...
April 06, 2011 Added by:Dan Dieterle
WPA2 Enterprise is the best if your organization supports it, but WPA2 Personal is great for home and small offices. Do not use WEP. It was cracked a long time ago, and an attacker does not even have to crack it, as the WEP key can be passed just like NTLM passwords...
March 22, 2011 Added by:Headlines
"It's a smart proposal. The federal wiretap law should be updated to take account of new transactional data. There is clearly a privacy interest in locational data and there is also a need for greater clarity," says the director of the Electronic Privacy Information Center, Marc Rotenberg...
Steps Toward Weaponizing the Android Platfor... Freid Jerome on 05-17-2013