Wi-Fi Security - News, Features, and Slideshows
Consider this: If you or an employee is using free Wi-Fi in some local café, in a matter of seconds a hacker can manipulate your machine into a "man-in-the-middle" scenario, where the device is now a conduit that sends data right to the bad guy. Once a device is compromised, login credentials (corporate mail server, bank accounts, LinkedIn.com, Facebook.com, etc.) can be harvested by using SSL Stripping.
By Michael Patterson, CEO, Plixer International | 27 November, 2013 16:12
People sign up for cruise ships to get away from it all. But not quite all: Passengers still want Wi-Fi access for the growing number of mobile devices they lug with them on vacation for staying in touch, web surfing, music, photos and video. Cruise line Royal Caribbean is turning to 802.11ac to optimize their Wi-Fi connectivity for this mobile data deluge.
By John Cox | 13 November, 2013 15:21
Georgia Tech researchers have developed a proof-of-concept attack called Jekyll that involves using Trojan Horse-style apps to sneak malware past Apple's app review process and onto iOS devices such as the iPhone and iPad.
By Bob Brown | 31 July, 2013 22:40
Underneath the mobile technology buzz at Mobile World Congress 2013 about expanding LTE deployments, and phasing in even faster LTE-Advanced networks later this year, is the strengthening market in operator-based Wi-Fi services.
By John Cox | 26 February, 2013 15:00
Using non-secured public Wi-Fi hotspots can leave you vulnerable to identity theft, data theft, snooping, impersonation and malware infection. That's why so many people rely on public virtual private network services, but VPNs are no panacea. Here are five potential gotchas.
By Sohail Ahmad, independent Wi-Fi consultant | 31 October, 2012 14:48
Flash storage represents a quantum leap from the storage layer in terms of performance, however it is crucial companies understand their I/O profile in order to formulate a successful storage strategy. Find out in this eBook how flash storage can be beneficial for enterprises and useful questions to ask before making an informed decision on the purchase.
- CCPega BPM Developer / Configurer - 12 months contractACT
- CCHelpdesk SupportNSW
- CCFront End Developer - MelbourneVIC
- FTJava Web Development OpportunityVIC
- CCSenior Systems Engineer - SCOM/SCCM/PowerShellVIC
- CCService EngineerVIC
- FTClient Services Manager - Programmatic AdvertisingNSW
- FTMobile Designer / Developer - IOSNSW
- CCContract Analyst Programmer (JAVA/Oracle/UNIX) 160203/AP/381Asia
- CCAutomation QAVIC
- FTServer EngineerNSW
- FTSenior Unified Communications Consultant - National IT ServicesNSW
- CCHybris Developer - Global ConsultancyNSW
- CCSolutions ArchitectNSW
- CCSenior Information Security SpecialistNSW
- FT.NET DeveloperVIC
- CCEnterprise Architect - Network & InfrastructureNSW
- CCContract Analyst Programmer (MS.Net/Visual Basic) 160129/AP/vtdAsia
- CCContract Analyst Programmer (SQL/Oracle/.Net) 160129/AP/vhs-bAsia
- CCJunior .NET DeveloperQLD
- FTSystems Engineer / Administrator - Managed ServicesNSW
- CCTibco DeveloperNSW
- FTNetwork Engineer | Canberra | NV1 NV2 clearance | Defence projectsVIC
- CCEXCEL Guru / Data AdministratorNSW
- CCIBM ESB Developer (Junior to mid level role)NSW
This eBook provides a broad overview of micro-segmentation in the data centre. After reading this , you’ll have a good basic understanding of micro-segmentation — like you’d get from a college-level 101 class, but far more interesting than Microbiology 101 or Microeconomics 101 (and not as difficult either)!
- Project Kratos: AWS Lambda functionality, without Amazon lock-in
- Microsoft expands Windows 10 release notes, but experts want more, much more
- Now your phone can scan documents directly to the cloud with Box Capture
- Schneier: terrorists will switch to more secure alternatives to avoid encryption backdoors
- Indegy finds out when industrial controls go bad (think Stuxnet)
- Critical VPN key exchange flaw exposes Cisco security appliances to remote hacking
- Qualcomm bringing LTE connectivity to wearables with new Wear platform
- Qualcomm's new chips target low-cost smartphones with premium features
- House bill would prevent patchwork of state laws banning smartphone encryption
- Facebook withdraws Free Basics from India after regulatory debacle
- Stock-market jitters have rocked network spending, Cisco says
- SD-WAN: What it is and why you’ll use it one day
- Android root malware widespread in third-party app stores
- UCLA just open-sourced a powerful new image-detection algorithm
- SCO vs. IBM legal battle over Linux may – finally – be finished