Blog Posts Tagged with "WEP"


Wireless Security 101

September 09, 2015 Added by:Jayson Wylie

Not everyone is technology savvy and push to get something to function verses securing it to the extent that it should be. Even though the latest wireless routers will use the more up-to-date security configurations, there are older setups that may not be adequate.

Comments  (0)


Quick Wireless Network Security Reminders

May 29, 2012 Added by:Brent Huston

I recently tested a couple of Android network stumblers on a drive around the city and I found that not a lot has changed for consumer wireless networks since I last stumbled. There are still a TON of unprotected networks, default SSIDs and WEP networks out there...

Comments  (2)


Wireless Security: Wi-Fi Hacking Burglars Get Busted

March 22, 2012 Added by:Robert Siciliano

Once a Wi-Fi network was located through wardriving, the hackers remotely watched for information that revealed the network’s security setup and vulnerabilities. Police said they used sophisticated electronic equipment to break through networks with WEP protection...

Comments  (0)


Full Frontal: Is it OK to Expose Weaknesses?

September 18, 2011 Added by:David Martinez

While it might be interesting and a bit exciting finding vulnerabilities in systems, keep in mind that reporting them to the appropriate people might be more hassle then it’s worth, especially when your doing it pro bono, as I discovered...

Comments  (0)


Wireless Security – Choosing the Best Wi-Fi Password

April 06, 2011 Added by:Dan Dieterle

WPA2 Enterprise is the best if your organization supports it, but WPA2 Personal is great for home and small offices. Do not use WEP. It was cracked a long time ago, and an attacker does not even have to crack it, as the WEP key can be passed just like NTLM passwords...

Comments  (0)


If Not The PCI Standards, Then What?

March 08, 2011 Added by:PCI Guru

As a new technology matures its security posture matures. With a more mature security posture, the lower the likelihood that a security incident will occur. However, the time it takes for that security maturity to occur can take quite a while and that is where organizations are at the highest risk...

Comments  (0)