Wireless Security

E595c1d49bf4a26f8e14ce59812af80e

Industry 4.0: Flexible Production Needs Secure Networking

September 29, 2014 Added by:Patrick Oliver Graf

When IT departments are not consulted, gaps in network security could appear.

Comments  (0)

Bd07d58f0d31d48d3764821d109bf165

Are Rogue Cell Towers Snooping On Your Calls?

September 08, 2014 Added by:Tripwire Inc

There are 17 bogus cellphone towers operating across the US that could be used to snoop on, and even hijack passing calls, texts and other communications, according to an article published in Popular Science last week.

Comments  (0)

E595c1d49bf4a26f8e14ce59812af80e

Back to BlackBerry: Frustrated Mobile Users Reject BYOD for the Former Market Leader

August 05, 2014 Added by:Patrick Oliver Graf

Thanks to what some say are restrictive Bring-Your-Own-Device (BYOD) and remote access policies, some mobile devices users in the corporate world are rebelling against BYOD – specifically, they don’t want their personal mobile devices to be controlled by their employer’s IT administrators.

Comments  (0)

E313765e3bec84b2852c1c758f7244b6

3 Tips for BYOD

June 18, 2014 Added by:Brent Huston

While much has been said about products and services that are emerging around this space, I wanted to tack back to 3 quick basics that can really help, especially in small and mid-size organizations.

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Tesla Cars Hackable – Protected by 6 character Password

April 02, 2014 Added by:Dan Dieterle

Black Hat Asia presenter and security researcher Nitesh Dhanjani explained last week that the car could be locked and unlocked by cracking a short password.

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Android Webview Exploit Tutorial

March 06, 2014 Added by:Dan Dieterle

Around 70% of all Android devices in the field are subject to a Javascript exploit that could allow an attacker remote access to your phone by doing nothing more than surfing to a malicious page or scanning in a malicious QR Code.

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Making the Mobile Web Safer with HTTPS Everywhere

February 04, 2014 Added by:Electronic Frontier Foundation

As of today, you can install HTTPS Everywhere on Firefox for Android(until now, it could only protect desktop browsers).

Comments  (0)

65be44ae7088566069cc3bef454174a7

Mobile Device Security Continues to get More Complicated

February 03, 2014 Added by:Rebecca Herold

Every business, of any size, in any location, that uses mobile computing devices during the course of business (and you would be hard-pressed to name any that truly do not) need to have mobile computing device information security and privacy policies and procedures in place.

Comments  (0)

54b393d8c5ad38d03c46d060fa365773

Security Advisor Alliance, A Nonprofit of Elite CISOs giving back to the community.

November 12, 2013 Added by:Jason Clark

Security Advisor Alliance is a nonprofit group of Top security leaders from the Global 1000 who have come together to donate time each week to help our peers in any area of security as a pro-bono service.

Comments  (1)

E595c1d49bf4a26f8e14ce59812af80e

Vehicle VPNs, Part One: The ‘Connected Car’

October 28, 2013 Added by:Patrick Oliver Graf

Remember, anything that is connected to the Internet is a potential target for hackers and cyber criminals. If they’ll hack your smartphone, tablet or laptop computer, who is to say they won’t try to do the same to your car?

Comments  (3)

F66c1a87a8db2cb584b4e06e93a84ce3

“SIGINT” on 802.11b/g/n Distributed SDR Station - Deployment Example

August 15, 2013 Added by:Mikko Jakonen

“SIGINT” on 802.11b/g/n distributed SDR station - deployment example is overview of using SDR (Software Defined Radio) receiver system deployment to capture 802.11b/g/n “traffic”, signals on frequency range 2412- 2484 MHz.

Comments  (1)

E595c1d49bf4a26f8e14ce59812af80e

Black Hat 2013: Key Takeaways on Remote Access Security

August 12, 2013 Added by:Patrick Oliver Graf

With the books closed on what was quite possibly the most controversial Black Hat conference ever, let’s take a few minutes to reflect on all of the hot button issues relating to remote access that spurred vigorous discussions and debates at this year’s event. Here are a few of our favorite remote access-related topics from Black Hat 2013.

Comments  (0)

98180f2c2934cab169b73cb01b6d7587

Cyber Security and Social Engineering – A True Case Study

August 01, 2013 Added by:Jon Stout

There are powerful integrated security dashboards that can be installed and modified to meet each user’s particular needs. Now a company can create hundreds if not thousands of employee cyber warriors with a relatively small investment.

Comments  (2)

98180f2c2934cab169b73cb01b6d7587

Top Secret SCI Jobs - The Value of Smaller Contractors

July 30, 2013 Added by:Jon Stout

You can be doing all the right things, adding immense value to your customer and helping your company build a great brand. When a contract changes even incumbents are suddenly “on the bench” or “between projects” or “on overhead” . You are no longer billable. As a result you have now moved from a profit-generator to a cost center. When this happens you are at risk.

Comments  (0)

8a958994958cdf24f0dc051edfe29462

Cyber Attacks the Reality, the Reason and the Resolution Part 3

June 24, 2013 Added by:Larry Karisny

Knowing the reality and reasons behind cyberattacks, it’s time to stop talking and start offering resolution to these serious problems. There is no "it won’t happen to me" anymore. We must immediately deploy prevention and detection technologies to our critical processes or frankly, we could lose it all.

Comments  (0)

4ed54e31491e9fa2405e4714670ae31f

Steps Toward Weaponizing the Android Platform

May 13, 2013 Added by:Kyle Young

In this article I will be covering ways that one can turn their Android based device into a powerful pocket sized penetration testing tool.

Comments  (10)

Page « < 2 - 3 - 4 - 5 - 6 > »