Wednesday, April 16th, 2008
Wireless security vendors used last week's conference here to showcase both the problems and solutions in controlling access to wireless voice and data.
AirTight Networks launched SpectraGuard Online, touted as wireless security's first manifestation of the software-as-a-service (SaaS) model that more vendors -- and a few cyber criminals -- are using.
In ...
Posted in Hardware, Internet, Networking, Security | No Comments
Wednesday, April 16th, 2008
About one percent of the Internet web pages are being changed in transit, sometimes in a harmful way, according to researchers at the University of Washington.
In a paper, set to be delivered Wednesday, the researchers document some troubling practices. In July and August they tested data sent to about 50,000 ...
Posted in Coding, Internet, Privacy, Security | No Comments
Tuesday, April 15th, 2008
While most VoIP-related vulnerabilities are posted to the VOIPSA mailing list or blog, I thought it might be useful to have a informal quarterly summary of sorts among VoIP devices per searches from NIST. I hope folks find it helpful, and of course post comments if I’ve overlooked anything from ...
Posted in Hardware, Internet, Networking, Security, Software | No Comments
Monday, April 14th, 2008
A security researcher claims to have found a significant weakness in the wireless encryption of a DSL home gateway made by Thomson and distributed to broadband subscribers in the U.K. by network operator BT.
Exploiting the weakness could enable someone to connect to a victim's Wi-Fi router for malicious purposes such ...
Posted in Hardware, Internet, Security | No Comments
Monday, March 17th, 2008
Wi-Fu! More than just a statement, it reflects you wireless security skill set from knowledge and practical experience. This covers everything from using the tools out there to profile and attack your wireless network, to checking the security of your client devices yourself. If you feel your Wi-Foo is slipping, ...
Posted in Hardware, Internet, Networking, Privacy, Security | No Comments
Page 10 of 12« First«...89101112»