Wi-Fi Security - News, Features, and Slideshows
Consider this: If you or an employee is using free Wi-Fi in some local café, in a matter of seconds a hacker can manipulate your machine into a "man-in-the-middle" scenario, where the device is now a conduit that sends data right to the bad guy. Once a device is compromised, login credentials (corporate mail server, bank accounts, LinkedIn.com, Facebook.com, etc.) can be harvested by using SSL Stripping.
By Michael Patterson, CEO, Plixer International | 27 November, 2013 16:12
People sign up for cruise ships to get away from it all. But not quite all: Passengers still want Wi-Fi access for the growing number of mobile devices they lug with them on vacation for staying in touch, web surfing, music, photos and video. Cruise line Royal Caribbean is turning to 802.11ac to optimize their Wi-Fi connectivity for this mobile data deluge.
By John Cox | 13 November, 2013 15:21
Georgia Tech researchers have developed a proof-of-concept attack called Jekyll that involves using Trojan Horse-style apps to sneak malware past Apple's app review process and onto iOS devices such as the iPhone and iPad.
By Bob Brown | 31 July, 2013 22:40
Underneath the mobile technology buzz at Mobile World Congress 2013 about expanding LTE deployments, and phasing in even faster LTE-Advanced networks later this year, is the strengthening market in operator-based Wi-Fi services.
By John Cox | 26 February, 2013 15:00
Using non-secured public Wi-Fi hotspots can leave you vulnerable to identity theft, data theft, snooping, impersonation and malware infection. That's why so many people rely on public virtual private network services, but VPNs are no panacea. Here are five potential gotchas.
By Sohail Ahmad, independent Wi-Fi consultant | 31 October, 2012 14:48
When Canadian food distributor George Weston Limited moved to Microsoft Office 365, it chose F5 Application Delivery Controllers to centrally manage user traffic to its Active Directory Federation Services (ADFS) servers.
This Dummies Guide explains the relatively new frontier of application-aware network performance management in an easy-to-understand and straightforward way. Find out, what the biggest challenges today’s networks are facing – from BYOD and Voice over IP to increasing complexity and why the end user’s experience is what really matters.
- Blackberry reports falling revenue, but loss shrinks
- Microsoft helps boost Android, iOS app performance with offline access
- Microsoft files suit against alleged tech support scammers
- Casio's latest Exilim high-speed camera can sync with up to seven others
- Critical vulnerability in Git clients puts developers at risk
- Hands-on with Sony's latest smartglasses
- Think North Korea hacked Sony? Think about this
- Uber temporarily suspends service in Portland
- The 'grinch' isn't a Linux vulnerability, Red Hat says
- Hybrid cloud adoption set for a big boost in 2015
- Driver's license app on a smartphone raises privacy issues
- Worst security breaches of the year 2014: Sony tops the list
- Messaging app Line buys Microsoft's MixRadio music-streaming app
- Vulnerability in embedded Web server exposes millions of routers to hacking
- Amazon Web Services updates console to simplify management