Wi-Fi Security - News, Features, and Slideshows
Consider this: If you or an employee is using free Wi-Fi in some local café, in a matter of seconds a hacker can manipulate your machine into a "man-in-the-middle" scenario, where the device is now a conduit that sends data right to the bad guy. Once a device is compromised, login credentials (corporate mail server, bank accounts, LinkedIn.com, Facebook.com, etc.) can be harvested by using SSL Stripping.
By Michael Patterson, CEO, Plixer International | 27 November, 2013 16:12
People sign up for cruise ships to get away from it all. But not quite all: Passengers still want Wi-Fi access for the growing number of mobile devices they lug with them on vacation for staying in touch, web surfing, music, photos and video. Cruise line Royal Caribbean is turning to 802.11ac to optimize their Wi-Fi connectivity for this mobile data deluge.
By John Cox | 13 November, 2013 15:21
Georgia Tech researchers have developed a proof-of-concept attack called Jekyll that involves using Trojan Horse-style apps to sneak malware past Apple's app review process and onto iOS devices such as the iPhone and iPad.
By Bob Brown | 31 July, 2013 22:40
Underneath the mobile technology buzz at Mobile World Congress 2013 about expanding LTE deployments, and phasing in even faster LTE-Advanced networks later this year, is the strengthening market in operator-based Wi-Fi services.
By John Cox | 26 February, 2013 15:00
Using non-secured public Wi-Fi hotspots can leave you vulnerable to identity theft, data theft, snooping, impersonation and malware infection. That's why so many people rely on public virtual private network services, but VPNs are no panacea. Here are five potential gotchas.
By Sohail Ahmad, independent Wi-Fi consultant | 31 October, 2012 14:48
Benefits based on Forrester Consulting Study “The Total Economic Impact of Converging SAP Landscapes on Vblock™ Systems”
Bolstered by favorable economics, today’s global botnets are using distributed denial-of-service (DDoS) attacks to target firewalls, web services, and applications, often simultaneously. This DDoS threat spectrum includes conventional network attacks, HTTP and SSL floods, and an emerging wave of low-bandwidth threats, plus the new threat vectors likely to target emerging service platforms.
- FCC pushes TV spectrum auction to 2016 after legal challenge
- Apple mum as Mac owners tussle with Yosemite over Wi-Fi problems
- Wireless price war's good for consumers, but challenges carriers
- Apple Pay tops Tim Cook's to-do list in China
- The ratings: Most net neutrality groups get poor grades for funding transparency
- Advocacy groups accused of obscuring corporate ties in net neutrality debate
- Secretive funding fuels ongoing net neutrality astroturfing controversy
- OS X Yosemite uptake climbs to 13% in first week
- Researcher works to make 3D-printed metals stronger, customizable
- Court shuts down alleged PC tech support scam
- New material could lead to longer-lasting batteries
- RiteAid blocks Apple Pay, Google Wallet
- Senator wants Whisper to explain how it tracks users, shares their data
- Apple hands 8 execs stock awards worth up to $27M
- Neural networks draw on context to improve machine translations