Wi-Fi Security - News, Features, and Slideshows
Consider this: If you or an employee is using free Wi-Fi in some local café, in a matter of seconds a hacker can manipulate your machine into a "man-in-the-middle" scenario, where the device is now a conduit that sends data right to the bad guy. Once a device is compromised, login credentials (corporate mail server, bank accounts, LinkedIn.com, Facebook.com, etc.) can be harvested by using SSL Stripping.
By Michael Patterson, CEO, Plixer International | 27 November, 2013 16:12
People sign up for cruise ships to get away from it all. But not quite all: Passengers still want Wi-Fi access for the growing number of mobile devices they lug with them on vacation for staying in touch, web surfing, music, photos and video. Cruise line Royal Caribbean is turning to 802.11ac to optimize their Wi-Fi connectivity for this mobile data deluge.
By John Cox | 13 November, 2013 15:21
Georgia Tech researchers have developed a proof-of-concept attack called Jekyll that involves using Trojan Horse-style apps to sneak malware past Apple's app review process and onto iOS devices such as the iPhone and iPad.
By Bob Brown | 31 July, 2013 22:40
Underneath the mobile technology buzz at Mobile World Congress 2013 about expanding LTE deployments, and phasing in even faster LTE-Advanced networks later this year, is the strengthening market in operator-based Wi-Fi services.
By John Cox | 26 February, 2013 15:00
Using non-secured public Wi-Fi hotspots can leave you vulnerable to identity theft, data theft, snooping, impersonation and malware infection. That's why so many people rely on public virtual private network services, but VPNs are no panacea. Here are five potential gotchas.
By Sohail Ahmad, independent Wi-Fi consultant | 31 October, 2012 14:48
In the current market, there is an increasing demand for unbiased information about Enterprise Mobility Management (EMM) solutions. This white paper focuses on solutions that are anticipated to have an important role in Enterprise Mobility Management. An overview of features has been created to enable a better understanding and comparison of capabilities.
This infographic looks at the current backup and recovery practices of IT managers and CIOs as well as their predictions and plans to protect their valuable information for the future. Find out: How much and where data in organisations is growing the fastest, the top 5 back up challenges organisations are facing and what the road ahead holds for backup and recovery strategies.
- Android ransomware on the rise in Australia
- Microsoft buries hatchet with Kyocera, ending litigation
- Plex hacker demands Bitcoin ransom for return of data
- Hands-on: Windows 10's latest build feels close to finished
- In Pictures: 7 things we hate about Twitter
- Supreme Court justices hold stock in tech vendors, other firms
- There's even an app for dogs and cats scared of fireworks
- Microsoft confirms 'waves' roll-out of Windows 10
- How Instagram spots a trend
- Longtime Microsoft partner Yahoo tests search with Google
- Third build of Windows 10 in one week a sign of OS stability
- GM to offer teen driver tracking to parents
- Scott McNealy sees gold in the hills of social data
- Sprint drops 600 Kbps video-streaming limit after outcry
- Bevy of cheap LTE smartphones on the way, Qualcomm says