Blog Posts Tagged with "Wireless"


Homemade Spy Drone Cracks WiFi and GSM Networks

August 01, 2011 Added by:Headlines

"WASP is equipped with the tools to crack Wi-Fi network passwords made possible by an on-board VIA EPIA Pico-ITX PC running BackTrack Linux equipped with 32GB of storage to record information. WASP can also act as a GSM network antenna meaning it will be able to eavesdrop on calls/text messages..."

Comments  (6)


Why Your Router is the Weak Point of Your Home Security

June 05, 2011 Added by:Lee Munson

When it comes to the home router while the device is very useful, it is also riddled with many security problems. This is a real weakness in the home network. Most people do not know how the router works, so they also have no idea that they must make security adjustments to the device...

Comments  (2)


Hacking the WPA Airwaves

May 16, 2011 Added by:Mark Bennett

Many people believe that their wireless is secure because they are using WPA. Well we did a test recently and were able to basically password guess our way with a dictionary attack using either a straight dictionary or a rainbow table. Using linux this is how it is done...

Comments  (1)


Wireless Security – Choosing the Best Wi-Fi Password

April 06, 2011 Added by:Dan Dieterle

WPA2 Enterprise is the best if your organization supports it, but WPA2 Personal is great for home and small offices. Do not use WEP. It was cracked a long time ago, and an attacker does not even have to crack it, as the WEP key can be passed just like NTLM passwords...

Comments  (0)


Senator Proposes Geolocation Privacy Legislation

March 22, 2011 Added by:Headlines

"It's a smart proposal. The federal wiretap law should be updated to take account of new transactional data. There is clearly a privacy interest in locational data and there is also a need for greater clarity," says the director of the Electronic Privacy Information Center, Marc Rotenberg...

Comments  (0)


Stealing Your Neighbor's WIFI Signal is Still Illegal

February 08, 2011 Added by:Headlines

Consumers know that leaving their Wi-Fi network open is not good, but the reality is that many have not taken the steps to protect themselves. Consumers can activate Wi-Fi security protections in a few simple steps, but much like the seatbelts in your car, it won't protect you unless you use it...

Comments  (1)


Charges Pending Against Google in WiFi Sniffing Case

January 14, 2011 Added by:Headlines

"While we have repeatedly acknowledged that the collection of payload data was a mistake, we are disappointed with this announcement as we believe Google Inc. and its employee did nothing illegal in Korea," Google Korea spokesman Ross LaJeunesses said...

Comments  (0)


Microsoft's Windows Phone 7 Sending Phantom Data

January 12, 2011 Added by:Headlines

Microsoft is looking in to reports that its Windows Phone 7 software is sending from mobile devices unexpectedly. Reports indicate the data transfers are relatively large, ranging from 2MB to 5MB in size per transfer, and some complaints have the totals levels as high as 30MB to 50MB per day...

Comments  (0)


Hacking Wireless for Identity Theft

January 02, 2011 Added by:Robert Siciliano

Wireless Internet is available in our homes, offices, cafes, restaurants, parks, hotels, airports, cars, and even airplanes. The mobility factor allows us to work anytime, anywhere, on numerous devices. “Being connected” is at an all-time high. Wireless Internet is amazing. But is it safe?

Comments  (0)


Your iPhone May Be Phoning Home to the Apple HQ

December 30, 2010 Added by:Theresa Payton

Apple has filed a patent so your phone can phone home in the event that it is lost or it's human owner is lost. They feel this next step in technology is necessary for locating stolen phones. In the patent they mention they want to help customers better protect their sensitive information...

Comments  (0)


Eight Essential Tips for a Secure 2011

December 30, 2010 Added by:Headlines

The list includes the obvious and not so obvious steps every user of online and mobile devices should implement. Grier's recommendations are simple, quick to employ, and can be accomplished at little or no cost to consumers...

Comments  (0)


FBI Taps Mobile Phone Mic's for Surveillance

December 27, 2010 Added by:Headlines

U.S. District Judge Lewis Kaplan issued an opinion on the use of "roving bugs" for criminal investigations, confirming suspicions that the FBI was employing the technique of listening to nearby conversations via a suspect's cell phone mic...

Comments  (0)


Intel Processor Chips Now 3G "Kill Switch" Enabled

December 21, 2010 Added by:Headlines

SMS kill-switch enabled devices may be vulnerable to unauthorized data deletion or susceptible to being disabled if the systems regulating the mechanism are breached by hackers or by way of an insider threat...

Comments  (0)


Weaponizing the Nokia N900 - Part 3

December 01, 2010 Added by:shawn merdinger

Overall, the usefulness of this written in Python is huge, and it allows the savvy user and coder to pull functionality from the SMSCON Python script and roll-your-own mini-tools to do specific actions on the N900...

Comments  (0)


Requirements That Are Never Not Applicable

November 24, 2010 Added by:PCI Guru

At the end of the day, the bottom line here is that all organizations are required to ensure that wireless networking is either not present on their network or, if present, it is only their wireless devices and that those wireless devices are appropriately implemented and secured...

Comments  (4)


Five Quick WLAN Configuration Tips

November 23, 2010 Added by:Global Knowledge

The consensus is that it’s a great technology with a few frustrating things. The good news is that the positives outweigh the negatives, otherwise people wouldn’t use it, right? The bad news is that direct information on simple config changes that might improve things can be hard to find...

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »