wireless
Guantanamo cuts off Wi-Fi access due to OpGTMO
The U.S. military, under whose command is the Guantanamo Bay Naval Base and the infamous prison of the same name that currently houses over 150 prisoners, has decided to shut …
Wi-Fi client security weaknesses still prevalent
Google Android, Apple iOS, BlackBerry, and Windows Mobile devices have an inherent security weakness in the method they use for connecting to Wi-Fi networks that has the …
A radical shift in security needs
During the last 40 years we’ve seen a small number of significant, user-driven shifts in the computing landscape, which change the way businesses and IT departments …
New Linksys Smart Wi-Fi Routers with AC technology
The Linksys Smart Wi-Fi Router AC 1200 and AC 1750 are available immediately and the Linksys Smart Wi-Fi Router AC 1600, model EA6400, is planned for availability in late May. …
How cybercriminals can target you on public networks
The widespread use of mobile communication, including cell phones, laptops and tablets, makes consumers particularly vulnerable to fraud and malware risks over public internet …
Tips for securely using free Tube Wi-Fi
GFI Software warned of potential data and device security concerns posed by using London’s public Wi-Fi service, installed across large parts of the London Underground …
The security risks of using Wi-Fi on the Tube
The arrival of widespread public Wi-Fi access across London Underground has been broadly welcomed by the general public, particularly those with smartphones and tablets who …
Wi-Fi sensors for remote monitoring
Monnit released a new line of Wi-Fi sensors, known as MoWi. These sensors use an integrated, 2.4GHz – 802.11b/g, FCC/CE certified radio transmitter. This allows them to …
Attacking SCADA wireless systems
Leased lines are recurring costs throughout the power grid. The bottom line demands the use of wireless solutions where possible. Dare we? We already do. The video below, …
Researcher warns about critical flaw in D-Link routers
A security flaw in D-Link’s DIR-300 and DIR-600 routers could allow remote attackers to inject execute arbitrary shell commands via a simple POST request without being …
Wireless Reconnaissance in Penetration Testing
Reconnaissance should always be the first stage of a cyber attack or penetration test, and the success of these attempts is usually closely tied with the quality of …
List of products affected by the vulnerable Broadcom UPnP stack
Recently, DefenseCode researchers have uncovered a high-risk Broadcom UPnP stack remote root vulnerability. The vulnerability is located within the wanipc and wanppp modules …
Featured news
Resources
Don't miss
- Attackers use “Contact Us” forms and fake NDAs to phish industrial manufacturing firms
- New framework aims to outsmart malware evasion tricks
- Finding connection and resilience as a CISO
- AI isn’t taking over the world, but here’s what you should worry about
- Agentic AI coding assistant helped attacker breach, extort 17 distinct organizations