Blog Posts Tagged with "Wireless"
Homemade Spy Drone Cracks WiFi and GSM Networks
August 01, 2011 Added by:Headlines
"WASP is equipped with the tools to crack Wi-Fi network passwords made possible by an on-board VIA EPIA Pico-ITX PC running BackTrack Linux equipped with 32GB of storage to record information. WASP can also act as a GSM network antenna meaning it will be able to eavesdrop on calls/text messages..."
Comments (6)
Why Your Router is the Weak Point of Your Home Security
June 05, 2011 Added by:Lee Munson
When it comes to the home router while the device is very useful, it is also riddled with many security problems. This is a real weakness in the home network. Most people do not know how the router works, so they also have no idea that they must make security adjustments to the device...
Comments (2)
Hacking the WPA Airwaves
May 16, 2011 Added by:Mark Bennett
Many people believe that their wireless is secure because they are using WPA. Well we did a test recently and were able to basically password guess our way with a dictionary attack using either a straight dictionary or a rainbow table. Using linux this is how it is done...
Comments (1)
Wireless Security – Choosing the Best Wi-Fi Password
April 06, 2011 Added by:Dan Dieterle
WPA2 Enterprise is the best if your organization supports it, but WPA2 Personal is great for home and small offices. Do not use WEP. It was cracked a long time ago, and an attacker does not even have to crack it, as the WEP key can be passed just like NTLM passwords...
Comments (0)
Senator Proposes Geolocation Privacy Legislation
March 22, 2011 Added by:Headlines
"It's a smart proposal. The federal wiretap law should be updated to take account of new transactional data. There is clearly a privacy interest in locational data and there is also a need for greater clarity," says the director of the Electronic Privacy Information Center, Marc Rotenberg...
Comments (0)
Stealing Your Neighbor's WIFI Signal is Still Illegal
February 08, 2011 Added by:Headlines
Consumers know that leaving their Wi-Fi network open is not good, but the reality is that many have not taken the steps to protect themselves. Consumers can activate Wi-Fi security protections in a few simple steps, but much like the seatbelts in your car, it won't protect you unless you use it...
Comments (1)
Charges Pending Against Google in WiFi Sniffing Case
January 14, 2011 Added by:Headlines
"While we have repeatedly acknowledged that the collection of payload data was a mistake, we are disappointed with this announcement as we believe Google Inc. and its employee did nothing illegal in Korea," Google Korea spokesman Ross LaJeunesses said...
Comments (0)
Microsoft's Windows Phone 7 Sending Phantom Data
January 12, 2011 Added by:Headlines
Microsoft is looking in to reports that its Windows Phone 7 software is sending from mobile devices unexpectedly. Reports indicate the data transfers are relatively large, ranging from 2MB to 5MB in size per transfer, and some complaints have the totals levels as high as 30MB to 50MB per day...
Comments (0)
Hacking Wireless for Identity Theft
January 02, 2011 Added by:Robert Siciliano
Wireless Internet is available in our homes, offices, cafes, restaurants, parks, hotels, airports, cars, and even airplanes. The mobility factor allows us to work anytime, anywhere, on numerous devices. “Being connected” is at an all-time high. Wireless Internet is amazing. But is it safe?
Comments (0)
Your iPhone May Be Phoning Home to the Apple HQ
December 30, 2010 Added by:Theresa Payton
Apple has filed a patent so your phone can phone home in the event that it is lost or it's human owner is lost. They feel this next step in technology is necessary for locating stolen phones. In the patent they mention they want to help customers better protect their sensitive information...
Comments (0)
Eight Essential Tips for a Secure 2011
December 30, 2010 Added by:Headlines
The list includes the obvious and not so obvious steps every user of online and mobile devices should implement. Grier's recommendations are simple, quick to employ, and can be accomplished at little or no cost to consumers...
Comments (0)
FBI Taps Mobile Phone Mic's for Surveillance
December 27, 2010 Added by:Headlines
U.S. District Judge Lewis Kaplan issued an opinion on the use of "roving bugs" for criminal investigations, confirming suspicions that the FBI was employing the technique of listening to nearby conversations via a suspect's cell phone mic...
Comments (0)
Intel Processor Chips Now 3G "Kill Switch" Enabled
December 21, 2010 Added by:Headlines
SMS kill-switch enabled devices may be vulnerable to unauthorized data deletion or susceptible to being disabled if the systems regulating the mechanism are breached by hackers or by way of an insider threat...
Comments (0)
Weaponizing the Nokia N900 - Part 3
December 01, 2010 Added by:shawn merdinger
Overall, the usefulness of this written in Python is huge, and it allows the savvy user and coder to pull functionality from the SMSCON Python script and roll-your-own mini-tools to do specific actions on the N900...
Comments (0)
Requirements That Are Never Not Applicable
November 24, 2010 Added by:PCI Guru
At the end of the day, the bottom line here is that all organizations are required to ensure that wireless networking is either not present on their network or, if present, it is only their wireless devices and that those wireless devices are appropriately implemented and secured...
Comments (4)
Five Quick WLAN Configuration Tips
November 23, 2010 Added by:Global Knowledge
The consensus is that it’s a great technology with a few frustrating things. The good news is that the positives outweigh the negatives, otherwise people wouldn’t use it, right? The bad news is that direct information on simple config changes that might improve things can be hard to find...
Comments (0)
- University of Arizona Researchers Going on Offense and Defense in Battle Against Hackers
- Securing the Internet of Things (IoT) in Today's Connected Society
- What Is Next Generation SIEM? 8 Things to Look For
- Cybersecurity and Online Trading: An Overview
- Artificial Intelligence: The Next Frontier in Information Security
- Five Main Differences between SIEM and UEBA
- For Cybersecurity, It’s That Time of the Year Again
- Myth Busters: How to Securely Migrate to the Cloud
- Microsoft Makes OneDrive Personal Vault Available Worldwide
- Human-Centered Security: What It Means for Your Organization