MS-CHAPv2 exploit - News, Features, and Slideshows
Using non-secured public Wi-Fi hotspots can leave you vulnerable to identity theft, data theft, snooping, impersonation and malware infection. That's why so many people rely on public virtual private network services, but VPNs are no panacea. Here are five potential gotchas.
By Sohail Ahmad, independent Wi-Fi consultant | 31 October, 2012 14:48
Cloud, big data and analytics, mobile, social, and IT security have impacted networking – bringing it almost to breaking point. This whitepaper looks at the future of networking to accommodate these evolving trends.
This e-book describes a hypothetical company as it reviews its traditional approach to WAN design and how it evolves its practices to meet their goals. This e-book includes a summary of the key components to WAN, 10 key architecture and design considerations and how businesses can grow their network while controlling costs and maintaining security.
- Apple falls to third in China smartphone rankings, while Xiaomi vaults ahead
- Cleaning up botnets takes years, if ever, to complete
- Yahoo tackles large 'malvertising' campaign in its ad network
- Beat the Q Posse Group raises $5m
- Cisco's SDN controller has a security hole
- OneDrive finally lets you sync shared folders
- Condé Nast parent company jumps into big data market with 1010data purchase
- HoloLens for the enterprise due within a year
- Bad vibe brews about Windows 10
- US counterterrorism expert says it's time to give companies offensive cybercapabilities
- Patch halt looms for half of all IE users
- IBM applies some engineering rigor to the Internet of Things
- AT&T launches wireless data and TV services on one bill
- Will Facebook envy wreck Twitter?
- Clinton plan to power U.S. homes with renewable energy in 10 years is doable