Blog Posts Tagged with "WiFi"

1a490136c27502563c62267354024cd5

That a Phone in Your Pocket or Are You Scanning My Network?

January 16, 2012 Added by:Malgorzata Skora

Smartphones have become much more powerful over the past few years. Combine this power with the right applications and you can scan a network from the inside in seconds, along with performing several other new types of attacks for information gathering...

Comments  (1)

759c37c6aff04cd46262f93652b5fad5

Wireless Security Tool Update: New EAPScan Features Check for WPS

January 12, 2012 Added by:Spencer McIntyre

Recently, WPS has been given a lot of attention due to research by Stefan Viehböck that exposed a vulnerability that allowed the PIN of WPS enabled devices to be brute-forced in an efficient manner.This is a major concern because it can ultimately expose the WPA passphrase used to join the network...

Comments  (0)

5e402abc3fedaf8927900f014ccc031f

Avoid Cracks in Your Website's Security Armor

January 08, 2012 Added by:Allan Pratt, MBA

I have heard from several colleagues that their blogs have been compromised. While a security breach may be inevitable – heck, branches of the Federal Government and national financial institutions have been hacked – there are steps you can take to protect the valuable data...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

FCC's Ten Cyber Security Tips for Small Businesses

November 29, 2011 Added by:Headlines

"Broadband and information technology are powerful factors in small businesses reaching new markets and increasing productivity and efficiency. However, businesses need cybersecurity tools and tactics to protect themselves, their customers, and their data from growing cyber threats..."

Comments  (0)

5e402abc3fedaf8927900f014ccc031f

Ten Tips to Stay Safe on Cyber Monday

November 16, 2011 Added by:Allan Pratt, MBA

Cyber Monday is the day when all employers cringe. They know that many employees will spend a portion of their work hours making online holiday purchases instead of working. Here are some tips to stay safe on the largest online activity day of the year...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Man Gets Eighteen Years for Hacking Neighbors

August 12, 2011 Added by:Robert Siciliano

In Minnesota prosecutors put away a “depraved criminal” for 18 years as a result of virtually torturing his neighbors via their Wi-Fi connection. After a brief encounter with his new neighbors he began “a calculated campaign to terrorize his neighbors”...

Comments  (1)

3ebd200287a032cf6d13d6b75a570c94

Quiet Please - H4xing in Progress

August 10, 2011 Added by:David Martinez

I used this script from the BT5 How-To page, which grabs packets, redirects them through sslstrip, prints the info to my machine, and sends it to the end-user with a spoofed source. Within 30 minutes, I had at least 5 different passwords for FB, Twitter, G-mail, and others...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Homemade Spy Drone Cracks WiFi and GSM Networks

August 01, 2011 Added by:Headlines

"WASP is equipped with the tools to crack Wi-Fi network passwords made possible by an on-board VIA EPIA Pico-ITX PC running BackTrack Linux equipped with 32GB of storage to record information. WASP can also act as a GSM network antenna meaning it will be able to eavesdrop on calls/text messages..."

Comments  (6)

4ff49873e3fed9a24adf0d37ae00b780

Why Your Router is the Weak Point of Your Home Security

June 05, 2011 Added by:Lee Munson

When it comes to the home router while the device is very useful, it is also riddled with many security problems. This is a real weakness in the home network. Most people do not know how the router works, so they also have no idea that they must make security adjustments to the device...

Comments  (2)

69dafe8b58066478aea48f3d0f384820

Android Privacy Flaw Exposes 99.7% of Users

May 19, 2011 Added by:Headlines

"Today we're starting to roll out a fix which addresses a potential security flaw that could, under certain circumstances, allow a third party access to data available in calendar and contacts. This fix requires no action from users and will roll out globally over the next few days..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Report: Public Wi-Fi Leaves Smartphone Data Vulnerable

April 26, 2011 Added by:Headlines

"This is all very alarming. It means that literally millions of people who use Wi-Fi in public could be at risk. If criminals are able to harvest the usernames and passwords of all the websites you visit, they could do significant damage in terms of identity theft and fraud..."

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Wireless Security – Choosing the Best Wi-Fi Password

April 06, 2011 Added by:Dan Dieterle

WPA2 Enterprise is the best if your organization supports it, but WPA2 Personal is great for home and small offices. Do not use WEP. It was cracked a long time ago, and an attacker does not even have to crack it, as the WEP key can be passed just like NTLM passwords...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Nine Tips for Securing Mobile Devices When Traveling

March 03, 2011 Added by:Headlines

Logan Kugler writes about his experience with being "firesheeped" on a recent trip. Firesheep can harvest login credential on unencrypted Wi-Fi networks. He interviewed several information security experts to compile the following tips on locking down your mobile devices when traveling...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Stealing Your Neighbor's WIFI Signal is Still Illegal

February 08, 2011 Added by:Headlines

Consumers know that leaving their Wi-Fi network open is not good, but the reality is that many have not taken the steps to protect themselves. Consumers can activate Wi-Fi security protections in a few simple steps, but much like the seatbelts in your car, it won't protect you unless you use it...

Comments  (1)

B64e021126c832bb29ec9fa988155eaf

Cracking WPA Protected WiFi in Six Minutes

January 18, 2011 Added by:Dan Dieterle

Security researcher Thomas Roth says with his brute force program he was able to break into a WPA-PSK protected network in about 20 minutes. And with recent updates to the program, the same password would take about 6 minutes...

Comments  (9)

69dafe8b58066478aea48f3d0f384820

Charges Pending Against Google in WiFi Sniffing Case

January 14, 2011 Added by:Headlines

"While we have repeatedly acknowledged that the collection of payload data was a mistake, we are disappointed with this announcement as we believe Google Inc. and its employee did nothing illegal in Korea," Google Korea spokesman Ross LaJeunesses said...

Comments  (0)

Page « < 1 - 2 - 3 > »