News

Wireless Network Protocols and Standards

  • December 12, 2014 12 Dec'14

    Sony Pictures hacking back: The ethics of obfuscation

    News roundup: Amid a devastating breach incident Sony Pictures is fighting back, raising legal and ethical questions. Plus: A big week in security acquisitions; Comcast sued over open Wi-Fi; and Yahoo announces vulnerability disclosure policy.

  • November 07, 2014 07 Nov'14

    With expanded open Wi-Fi, are ISPs offering convenience or aiding criminals?

    News roundup: Open Wi-Fi allegedly aided a fugitive in evading authorities, highlighting Wi-Fi hotspot risks as ISPs including Comcast turn residential gateways into hotspots. Plus: Google's nogotofail tool; messaging apps fail EFF security review; ...

  • December 29, 2009 29 Dec'09

    GSM cell phone encryption crack may force operators to upgrade

    Karsten Nohl, a widely known encryption expert, has cracked the GSM encryption algorithm and claims software is available for hackers to eavesdrop on calls.

  • July 30, 2009 30 Jul'09

    MMS messaging spoof hack could have global ramifications

    Researchers have figured out a way to spoof sender numbers, bypass carrier protections and trick mobile devices to pull content from an attacker's server. This would leave users vulnerable to phishing attacks and other scams.

  • July 16, 2009 16 Jul'09

    PCI group releases wireless security guide

    Guide analyzes PCI requirements pertaining to wireless networks and provides recommendations.

  • November 18, 2008 18 Nov'08

    Cybersecurity expert sees PCI DSS problems ahead for retailers

    It could cost millions of dollars for retailers to rip and replace outdated systems and devices still using Wired Equivalent Privacy (WEP) to secure 802.11 wireless networks, according to a security expert tracking cybersecurity in the retail ...

  • August 21, 2008 21 Aug'08

    PCI groups to focus on wireless, pre-authorization changes

    The PCI Security Standards Council has started two special interest groups to focus on pre-authorization and wireless security issues.

  • August 19, 2008 19 Aug'08

    PCI DSS 1.2 clarifies wireless, antivirus use

    Version 1.2 of PCI DSS, due out in October, requires 802.1x for wireless protection and antivirus for all operating systems, according to a summary of the changes issued Tuesday.

  • August 07, 2008 07 Aug'08

    Bluetooth 2.1 is easy to crack

    Black Hat: A cryptographer says Bluetooth version 2.1, designed to be more secure than previous versions, is actually extremely vulnerable to attackers.

  • September 25, 2007 25 Sep'07

    TJX should have had stronger Wi-Fi encryption, say Canadian officials

    TJX Cos. should have moved faster to upgrade its Wi-Fi security from WEP encryption to WPA encryption, say Canadian officials.

  • August 09, 2007 09 Aug'07

    Wi-Fi simplicity edging out Wi-Fi security

    Experts say the standards are available to lock down Wi-Fi, but many network and security managers are taking an easier approach.

  • June 04, 2007 04 Jun'07

    VeriSign, AirMagnet team up for wireless IPS

    Gartner IT Security Summit: VeriSign and AirMagnet announce collaboration on the new VeriSign Wireless Intrusion Prevention Service (IPS) to help IT shops defend Wi-Fi users.

  • May 07, 2007 07 May'07

    TJX breach tied to Wi-Fi exploits

    The TJX hackers started their assault two years ago by attacking security holes in the retail giant's wireless system outside a Minnesota Marshalls.

  • April 09, 2007 09 Apr'07

    WEP crack demonstrates need for WPA2

    A new paper highlighting the weakness of Wired Equivalent Privacy (WEP) is a call to all users to switch to the more secure Wi-Fi Protected Access 2 (WPA2).

  • March 02, 2007 02 Mar'07

    Black Hat RFID controversy has bloggers up in arms

    This week in Security Blog Log: Infosec pros slam HID Corp., the firm that tried to quash a Black Hat presentation on flaws in its RFID technology, calling HID the latest champion of security through obscurity.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close