June 28, 2012 Added by:Robert Siciliano
Today, with criminal hackers as sophisticated as ever, if you are using an open unsecured network on your mobile device, you risk exposing your data. There are many ways for hackers to see who’s connected on a wireless connection, and to gain access to your information...
May 29, 2012 Added by:Brent Huston
I recently tested a couple of Android network stumblers on a drive around the city and I found that not a lot has changed for consumer wireless networks since I last stumbled. There are still a TON of unprotected networks, default SSIDs and WEP networks out there...
May 25, 2012 Added by:Fergal Glynn
Did you know that this year the number of Wi-Fi connected devices will exceed the world’s population? This incredible statistic highlights the ubiquitous nature of Wi-Fi. However, the convenience of public Wi-Fi practically everywhere comes at the cost of greater risk to users...
March 23, 2012 Added by:Electronic Frontier Foundation
The U.S. Supreme Court’s decision has been lauded as a landmark ruling and the FBI's own lawyer commented that it is perceived as a sea change within the FBI. And now its impact is starting to work its way through the judicial system as courts evaluate warrantless use of GPS devices...
March 22, 2012 Added by:Robert Siciliano
Once a Wi-Fi network was located through wardriving, the hackers remotely watched for information that revealed the network’s security setup and vulnerabilities. Police said they used sophisticated electronic equipment to break through networks with WEP protection...
March 08, 2012 Added by:Robert Siciliano
Wi-Fi is great for bringing in customers and as a promotional tool that creates customer loyalty. Merchants such as hotels, coffee shops, burger joints and anyplace with a store front, chairs and tables is offering free Wi-Fi. But what about all the Wi-Fi security threats?
March 06, 2012 Added by:Kelly Colgan
Portable and mobile storage devices are significant players in most corporate offices. Ensuring proper protection with a best practices policy and strict enforcement offers significant risk reduction—and can prevent long nights on data breach investigations...
February 10, 2012 Added by:Security Ninja
Developers, project managers and executive officers need to be able to evaluate the risk that they are exposing their customers and their businesses to. They need to know how to measure the security posture of their apps and to make decisions on what changes to make...
February 07, 2012 Added by:Theresa Payton
Many of us use and love Bluetooth technology. It’s easy to set up and convenient to use. But you might want to think twice about what you use it for because that easy connection for you can also be an easy connection for a cybercreep...
January 12, 2012 Added by:Spencer McIntyre
Recently, WPS has been given a lot of attention due to research by Stefan Viehböck that exposed a vulnerability that allowed the PIN of WPS enabled devices to be brute-forced in an efficient manner.This is a major concern because it can ultimately expose the WPA passphrase used to join the network...
November 17, 2011 Added by:Steven Fox, CISSP, QSA
The selection of encryption algorithms to support a mobile device will be determined by data classification considerations and business requirements. Several vendors in the defense industry are developing FIPS 140-2 validated devices to support applications used by the DoD and NSA...
November 16, 2011 Added by:David Navetta
November 07, 2011 Added by:Headlines
The NIST has issued two new guides addressing issues with wireless security. The first guide focuses on Bluetooth security, while the second looks at wireless local area networks. The NIST is seeking public comment on the guides via email with a November 10th cutoff for submissions...
November 04, 2011 Added by:Bill Gerneglia
Small and medium businesses are increasingly more mobile as their employees are demanding increased access from both the home and the road like never before. SMBs face a wide range of challenges when it comes to providing this access for these mobile workforces...
October 15, 2011 Added by:Spencer McIntyre
EAPeak is a suite of open source tools to facilitate auditing of wireless networks that utilize the Extensible Authentication Protocol framework for authentication. It provides useful information relating to the security of these networks for PenTesters to use in searching for vulnerabilities...
October 09, 2011 Added by:Kyle Young
If the victim computers are part of a Windows domain and have wireless NICs, by automating Metasploit with a pass-the-hash attack and using my script, one could essentially automate deploying a series of rogue ap points throughout a domain. This would be kind of like a network worm...
Compliance and Security Trends... akikah tangerang on 09-19-2014
Carberp Botnet Lifecycle Infographic... akikah tangerang on 09-19-2014
The Benefits of FUD... akikah tangerang on 09-19-2014