Wi-Fi Security - News, Features, and Slideshows
Consider this: If you or an employee is using free Wi-Fi in some local café, in a matter of seconds a hacker can manipulate your machine into a "man-in-the-middle" scenario, where the device is now a conduit that sends data right to the bad guy. Once a device is compromised, login credentials (corporate mail server, bank accounts, LinkedIn.com, Facebook.com, etc.) can be harvested by using SSL Stripping.
By Michael Patterson, CEO, Plixer International | 27 November, 2013 16:12
People sign up for cruise ships to get away from it all. But not quite all: Passengers still want Wi-Fi access for the growing number of mobile devices they lug with them on vacation for staying in touch, web surfing, music, photos and video. Cruise line Royal Caribbean is turning to 802.11ac to optimize their Wi-Fi connectivity for this mobile data deluge.
By John Cox | 13 November, 2013 15:21
Georgia Tech researchers have developed a proof-of-concept attack called Jekyll that involves using Trojan Horse-style apps to sneak malware past Apple's app review process and onto iOS devices such as the iPhone and iPad.
By Bob Brown | 31 July, 2013 22:40
Underneath the mobile technology buzz at Mobile World Congress 2013 about expanding LTE deployments, and phasing in even faster LTE-Advanced networks later this year, is the strengthening market in operator-based Wi-Fi services.
By John Cox | 26 February, 2013 15:00
Using non-secured public Wi-Fi hotspots can leave you vulnerable to identity theft, data theft, snooping, impersonation and malware infection. That's why so many people rely on public virtual private network services, but VPNs are no panacea. Here are five potential gotchas.
By Sohail Ahmad, independent Wi-Fi consultant | 31 October, 2012 14:48
Unstructured data formats are much harder to search and analyse than databases or simple text. In this context, ‘big data’ is a challenge, not an advantage. This whitepaper looks at how you can apply a data-centric approach across diverse business areas and shows how, having cracked open the content of unstructured data, your organisation can develop processes and competencies that will reduce costs, improve efficiency and deliver new sources of business value.
- CCWeb / Drupal DeveloperNSW
- CCMilitary simulation programmer with C# and Unity - 3 monthsNSW
- FTLinux Administrator with AWS & DevopsNSW
- FTLevel 2 IT Support TechnicianVIC
- CCE-Commerce - Senior Web Application DeveloperNSW
- FTAndroid DeveloperNSW
- FTSystems Administrator - Managed ServicesNSW
- FTSenior Consultant | Project work | National Systems IntegratorVIC
- FT1st & 2nd level IT support all-rounder in beautiful rural BathurstNSW
- FTField EngineerNSW
- FTManual Test Engineer | Financial Institution | Web testingNSW
- FTSystems Administrator | National commercial law firm | MS, AWS & eDiscoveryNSW
This IDC research whitepaper looks at the three key APAC enterprise IT mega-trends that are driving digital transformation and the five aspects CIOs and their business peers will need to transform within their organisation to keep pace with the evolving landscape. Find out CxOs rising digital priorities, all-flash array adoption and performance specific to the region.
- FBI takes down alert on chip credit cards after bankers complain
- Firefox to drop old-tech plug-ins by end of 2016
- Meet the virtual woman who may take your job
- Dismal PC business contraction continues; no bounce yet from Windows 10
- Juniper Networks looking to go private?
- Display Dock for new Lumias will cost $99
- 3 Takeaways from Amazon’s re:Invent cloud conference
- AWS re:Invent and VMworld: A tale of two conferences
- LogMeIn buying password manager LastPass
- Wi-Fi Alliance reaches for peace over unlicensed LTE
- 7 warnings to heed before a cloud migration
- Facebook splits React library across Web and mobile
- US will not seek legislation against encryption
- Apple removes apps from store that could spy on your data traffic
- Alibaba sets up second data center in the US in $1B cloud expansion