Menu

Wi-Fi Security - News, Features, and Slideshows

News

  • How to use public Wi-Fi hotspots safely

    Consider this: If you or an employee is using free Wi-Fi in some local café, in a matter of seconds a hacker can manipulate your machine into a "man-in-the-middle" scenario, where the device is now a conduit that sends data right to the bad guy. Once a device is compromised, login credentials (corporate mail server, bank accounts, LinkedIn.com, Facebook.com, etc.) can be harvested by using SSL Stripping.

    Written by Michael Patterson, CEO, Plixer International27 Nov. 13 16:12
  • Cruise line plans 11ac network upgrades for stem-to-stern Wi-Fi

    People sign up for cruise ships to get away from it all. But not quite all: Passengers still want Wi-Fi access for the growing number of mobile devices they lug with them on vacation for staying in touch, web surfing, music, photos and video. Cruise line Royal Caribbean is turning to 802.11ac to optimize their Wi-Fi connectivity for this mobile data deluge.

    Written by John Cox13 Nov. 13 15:21
  • MWC: Carrier Wi-Fi playing more prominent role

    Underneath the mobile technology buzz at Mobile World Congress 2013 about expanding LTE deployments, and phasing in even faster LTE-Advanced networks later this year, is the strengthening market in operator-based Wi-Fi services.

    Written by John Cox26 Feb. 13 15:00
  • Caveats for VPN users in public Wi-Fi hotspot networks

    Using non-secured public Wi-Fi hotspots can leave you vulnerable to identity theft, data theft, snooping, impersonation and malware infection. That's why so many people rely on public virtual private network services, but VPNs are no panacea. Here are five potential gotchas.

    Written by Sohail Ahmad, independent Wi-Fi consultant31 Oct. 12 14:48
  • Wi-Fi security do's and don'ts

    Wi-Fi is inherently susceptible to hacking and eavesdropping, but it can be secure if you use the right <a href="http://www.networkworld.com/topics/security.html">security</a> measures. Unfortunately, the Web is full of outdated advice and myths. But here are some do's and don'ts of Wi-Fi security, addressing some of these myths.

    Written by Eric Geier07 Nov. 11 22:28
  • Researchers customize Android for sophisticated smartphone lockdown

    <a href="http://www.vtnews.vt.edu/articles/2011/10/101711-outreach-cybersecurephones.html">Virginia Tech researchers</a> for the past month and a half have been working to customize Google’s Android software to lock down smartphones so that sensitive data isn’t exposed once a user leaves approved locations. They’re hopeful the technology – part of a project dubbed GhostBox -- will be production-ready by year-end.

    Written by Bob Brown21 Oct. 11 09:34
  • WiFi Vulnerabilities: Advances and incidents in 2010

    The 802.11n standard was ratified in 2009 and WiFi really took off in 2010, with support showing up in an array of consumer electronic devices. Unfortunately security related issues escalated right along with growing acceptance.  Here’s a look back at the WiFi security issues that emerged this year.

    Written by Ajay Kumar Gupta21 Dec. 10 04:38
  • Meeting the new PCI wireless requirements

    Beginning Sept. 30, Visa will require merchants and related businesses to conduct wireless security scans to prove compliance with version 1.2 of the PCI Data Security Standard (PCI DSS) which is designed to safeguard cardholder data from wireless threats.

    Written by Ajay Kumar Gupta25 Sept. 10 03:34
  • Wireless consumer-ization: User joy, IT's misery

    Wi-Fi support has made its way into all kinds of consumer devices -- from smartphones to gaming consoles, cameras, DVD players and televisions -- and it is often implemented with native connection sharing capabilities. While great for consumers, this creates security and performance issues when any of these devices end up at work.

    Written by Gopinath KN, director engineering, AirTight Networks15 Sept. 10 08:01
Computerworld
ARN
Techworld
CMO