Please turn on your JavaScript for this page to function normally.
Broadcom releases 40nm Wi-Fi and Bluetooth combo chip

Broadcom released the BCM43142 InConcert combo chip which combines Wi-Fi Direct connectivity with seamless proximity-based pairing, simplifying wireless connectivity in the …

iPhone-enabled wireless multimeter

Redfish Instruments introduced the iDVM Digital Multimeter which wirelessly connects to an iPhone, iPad, or iPod Touch via an ad hoc wireless network allowing users to …

Enhance mobility and security at branch offices

Cisco announced new solutions that continue to enhance mobility and security at branch offices without adding new in-branch hardware or support burdens. Using cloud deployment …

Wardriving gang targeting small firms

A group of individuals who are believed to have been engaged in wardriving around Seattle and stealing personal and financial information from networks belonging to small area …

Outdated law makes wireless hacking acceptable

A ruling handed out earlier this month in The Netherlands set a precedent that will allow the nation’s citizens to “piggyback” on open WiFi networks and to …

Wireshark 1.4.4 released

Wireshark is a popular network protocol analyzer. It is used for troubleshooting, analysis, development, and education. Wireshark 1.4.4 fixes the following vulnerabilities: …

Video: Light painting Wi-Fi

This project explores the invisible terrain of Wi-Fi networks in urban spaces by light painting signal strength in long-exposure photographs. A four meter long measuring rod …

Enhanced wireless network protection

Fluke Networks released AirMagnet Enterprise 9.0, a wireless intrusion prevention system for managing and securing corporate WLAN deployments. The latest release introduces …

Managed Wi-Fi access and PCI scanning in a single device

AirTight Networks launched Secure Wi-Fi – a suite of managed services which adds Wi-Fi access. With today’s launch, the company offers hosted, cloud-based, secure …

Top wireless security trends for 2011

Today’s security needs are different than they were a decade ago. People are ‘connected’ thanks to mobile devices so they can stay linked to their security …

Don't miss

Cybersecurity news