Blog Posts Tagged with "Wireless"

54a9b7b662bfb0f0445d1661d7ed180b

Wireless Security 101

September 09, 2015 Added by:Jayson Wylie

Not everyone is technology savvy and push to get something to function verses securing it to the extent that it should be. Even though the latest wireless routers will use the more up-to-date security configurations, there are older setups that may not be adequate.

Comments  (0)

2e8f6abb718502da4cf12a5bc5d0bae7

Wireless Home Technologies Create Security Risks

August 21, 2013 Added by:Christopher Barber

With the products available for professional or DIY home automation, the security dangers start with the protocols used for wired and wireless connectivity.

Comments  (26)

54a9b7b662bfb0f0445d1661d7ed180b

Home Wireless Pen Testing for Business or Pleasure . . . .

June 21, 2013 Added by:Jayson Wylie

My intent for presenting the following information is to identify and start people in the use of easy and commonly used BackTrack 5 R3 (BT5 R3) tools to look for some of the more current critical flaws found in the home brand lines of network wireless devices

Comments  (2)

Ffc4103a877b409fd8d6da8f854f617e

Infographic: Staying Safe While Using Public Wi-Fi

May 01, 2013 Added by:InfosecIsland News

To help users avoid online fraud and malware risks, ThreatMetrix provided the following infographic which highlights several scenarios of how cybercriminals can access sensitive transactions over public networks.

Comments  (2)

7e364bbac217114a59e547b354e7f7ad

Network Design, Wireless Security, and Password Policies - Business Beware

October 15, 2012 Added by:Gary McCully

A while back I was on a wireless assessment in which I was able to compromise the client’s primary Windows Domain from their guest wireless network. My hope in writing this article is that organizations will take their network design, wireless security, and password policies a little more seriously...

Comments  (0)

3e35900ae6facc6c146a85c435c71d82

Wireless Network Security: A Beginner's Guide

August 02, 2012 Added by:Ben Rothke

The T.J. Maxx data breach was due to insecure wireless connectivity. Estimates of the costs for this security fiasco are a staggering $4.5 billion. Had the staff at T.J. Maxx had this book at hand and used it, they may have been able to save themselves a significant amount of money...

Comments  (0)

7c5c876d1933023ac375eead04302e1a

Un-Ninja the NinjaTel Phone

August 01, 2012 Added by:Boris Sverdlik

For the lucky few that did get the phone, you will be happy to know that the phone has been rooted, but the bootloader is locked. In order to get to any of the settings all that was required was pulling up the IDE app in an area where the phone couldn't connect to any of the pre-installed wireless access points...

Comments  (5)

964eef19f95b77a2606d36daf6deb25f

Visualize Wi-Fi Networks Using Vistumbler and Google Earth

July 30, 2012 Added by:Dale Rapp

Vistumbler is an excellent free tool that scans for nearby wireless networks within range of your wi-fi adapter. Once Vistumbler finds a wireless network it will display the networks SSID, signal strength, encryption being used, mac address, the networks channel, access point manufacturer, and much more...

Comments  (4)

69dafe8b58066478aea48f3d0f384820

NSA Seeks Solutions for Secure Mobile Capabilities

July 23, 2012 Added by:Headlines

“First and foremost, our whole strategy from a classified mobility perspective is very much focused on commercial solutions for classified [communications]... It’s our intent that we would deliver, end-to-end, a solution that is reliant on all commercial components and we believe we can do that...”

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Law Enforcement Sought 1.3 Million Cell Phone Records in 2011

July 09, 2012 Added by:Headlines

“Law enforcement agencies are looking for a needle, but what are they doing with the haystack? We need to know how law enforcement differentiates between records of innocent people, and those that are subjects of investigation, as well as how it handles, administers, and disposes of this information..."

Comments  (0)

964eef19f95b77a2606d36daf6deb25f

Is Your WPA2 Protected Wireless Network Really Secure

July 01, 2012 Added by:Dale Rapp

A weak WPA2 passphrase could be hacked allowing an unauthorized person to use the wireless network. Even worse this unauthorized person could decrypt the communications revealing emails you send, web sites you visit, and passwords you use for access to websites...

Comments  (0)

37d5f81e2277051bc17116221040d51c

How Do I Protect Myself When Using Wi-Fi?

June 28, 2012 Added by:Robert Siciliano

Today, with criminal hackers as sophisticated as ever, if you are using an open unsecured network on your mobile device, you risk exposing your data. There are many ways for hackers to see who’s connected on a wireless connection, and to gain access to your information...

Comments  (0)

964eef19f95b77a2606d36daf6deb25f

Is Hiding the Wireless SSID All the Network Security You Need?

June 20, 2012 Added by:Dale Rapp

The bad guy doesn't need to know if a wireless network is hidden or connected to the network to capture unencrypted traffic, and this unencrypted traffic could be divulging emails you send, web sites you visit, and passwords you type into log in pages. Encryption should always be used...

Comments  (3)

E313765e3bec84b2852c1c758f7244b6

Quick Wireless Network Security Reminders

May 29, 2012 Added by:Brent Huston

I recently tested a couple of Android network stumblers on a drive around the city and I found that not a lot has changed for consumer wireless networks since I last stumbled. There are still a TON of unprotected networks, default SSIDs and WEP networks out there...

Comments  (2)

68b48711426f3b082ab24e5746a66b36

Free Wi-Fi - Friend or Foe? An Infographic

May 25, 2012 Added by:Fergal Glynn

Did you know that this year the number of Wi-Fi connected devices will exceed the world’s population? This incredible statistic highlights the ubiquitous nature of Wi-Fi. However, the convenience of public Wi-Fi practically everywhere comes at the cost of greater risk to users...

Comments  (0)

E595c1d49bf4a26f8e14ce59812af80e

Making Mobile Health Security Possible

May 20, 2012 Added by:Patrick Oliver Graf

It’s no secret that healthcare is going mobile. If hackers or disloyal employees scan or manipulate health data that is sent via mobile applications, the consequences can range from embarrassment to death. Ensuring these connections are secure is absolutely critical...

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »