Sunday, May 4th, 2008
Ars Technica's original Wireless Security Blackpaper was first published back in 2002, and in the intervening years, it has been a great reference for getting the technical lowdown on different wireless security protocols. As a sequel to the original blackpaper, we wanted to do something a little more basic and ...
Posted in Hardware, Internet, Networking, Privacy, Security | No Comments
Thursday, May 1st, 2008
I am pretty sure that there are a number of you out there reading this blog over a wireless network. Given that wireless is so widely distributed these days, its not uncommon that users are unaware of how insecure their wireless setup maybe.
Unfortunately one other reality is that a number ...
Posted in Hardware, Internet, Privacy, Security, Software | No Comments
Monday, April 28th, 2008
Wireless networking technologies are a rich playground for hackers -- both ethical penetration testers and malicious attackers. There are many avenues of attack, ranging from attacking the infrastructure, the clients, or the actual traffic through man-in-the-middle sniffing and manipulation. Rich Mogull covered the wireless “Evil Twin” attack in his recent ...
Posted in Hardware, Internet, Networking, Privacy, Security | No Comments
Wednesday, April 23rd, 2008
Our columnist shows you how to get rid of spyware, shrug off spam, and stay safe on unsecured public networks.
Viruses, spyware, and worms. Oh, my!
We all know the dangers inherent in accessing the Internet, and we all take precautions. Yet our PCs still occasionally get infected because we can't know ...
Posted in Internet, Privacy, Security | No Comments
Monday, April 21st, 2008
With all the high storage devices like the iPod classic going up to 160GB and just fitting in your inside pocket, people are getting more scared of data loss. Even Dave Lewis from Liquidmatrix recently saw someone at a client site using an iPod to pull corporate data onto it ...
Posted in Hardware, Security | No Comments