Wireless network security
- January 22, 2020
Security researchers revealed Netgear firmware exposed TLS certificate keys, but SearchSecurity discovered it wasn't the first time the issue had been reported to the vendor.
- April 12, 2019
Researchers discovered vulnerabilities in the WPA3 protocol, specifically in the Dragonfly handshake authentication, allowing for multiple exploits branded Dragonblood.
- April 11, 2019
Troubles continue for Huawei as new bans and government reports put security into question, but the company is attempting to fight back against the criticism.
- April 10, 2019
According to Nokia's Kevin McNamee, the rise of 5G will mean more danger of IoT botnets, but also more options to secure those devices -- including using network slicing for segmentation.
- December 18, 2018
While the number of countries with Huawei bans in place grows and more issue warnings, a German investigation found no evidence of spying to support the fear.
- June 26, 2018
Latest WPA3 security protocol update adds new features to the Wi-Fi access specification for simple and secure wireless access for individuals, as well as enterprises.
- June 22, 2018
Sen. Ron Wyden got all major U.S. wireless carriers to promise not to sell mobile location data to third parties, but experts question the basic security practices in place.
- June 01, 2018
News roundup: A major cellular network may have been compromised by exploiting SS7 vulnerabilities, according to reports. Plus, Kaspersky's lawsuits have been dismissed, and more.
- May 17, 2018
Following news that it provides near real-time location data to law enforcement without warrants, a Securus hack exposed information on those law enforcement customers.
- January 11, 2018
The new WPA3 Wi-Fi protocol aims to improve security for IoT devices and strengthen password security with protections against brute force attacks.
- October 17, 2017
Researchers discover a WPA2 vulnerability and brand it KRACK, but some experts say the early reports overstate the risk of the flaw and downplay the difficulty of an exploit.
- July 28, 2017
At Black Hat 2017, Exodus Intelligence researcher Nitay Artenstein unveiled the Broadpwn exploit, which he called the world's first Wi-Fi worm and which puts billions of iOS and Android devices at risk.
- July 07, 2017
Broadpwn, a flaw in Broadcom Wi-Fi chipsets, is patched, but Google withholds details. Plus, the latest in the antivirus drama between the U.S. and Russia, and more.
- December 19, 2014
Check Point has uncovered a widespread home router security vulnerability, dubbed Misfortune Cookie, that could allow attackers to gain control over millions of devices.
- December 18, 2014
According to WatchGuard, seven out of 10 restaurants, hotels and other businesses don't take the necessary steps to secure their guest Wi-Fi networks.
- December 12, 2014
News roundup: Amid a devastating breach incident Sony Pictures is fighting back, raising legal and ethical questions. Plus: A big week in security acquisitions; Comcast sued over open Wi-Fi; and Yahoo announces vulnerability disclosure policy.
- November 07, 2014
News roundup: Open Wi-Fi allegedly aided a fugitive in evading authorities, highlighting Wi-Fi hotspot risks as ISPs including Comcast turn residential gateways into hotspots. Plus: Google's nogotofail tool; messaging apps fail EFF security review; ...
- December 29, 2009
Karsten Nohl, a widely known encryption expert, has cracked the GSM encryption algorithm and claims software is available for hackers to eavesdrop on calls.
- July 30, 2009
Researchers have figured out a way to spoof sender numbers, bypass carrier protections and trick mobile devices to pull content from an attacker's server. This would leave users vulnerable to phishing attacks and other scams.
- August 07, 2008
Black Hat: A cryptographer says Bluetooth version 2.1, designed to be more secure than previous versions, is actually extremely vulnerable to attackers.
- September 25, 2007
TJX Cos. should have moved faster to upgrade its Wi-Fi security from WEP encryption to WPA encryption, say Canadian officials.
- August 09, 2007
Experts say the standards are available to lock down Wi-Fi, but many network and security managers are taking an easier approach.
- May 07, 2007
The TJX hackers started their assault two years ago by attacking security holes in the retail giant's wireless system outside a Minnesota Marshalls.
- April 09, 2007
A new paper highlighting the weakness of Wired Equivalent Privacy (WEP) is a call to all users to switch to the more secure Wi-Fi Protected Access 2 (WPA2).
- March 02, 2007
This week in Security Blog Log: Infosec pros slam HID Corp., the firm that tried to quash a Black Hat presentation on flaws in its RFID technology, calling HID the latest champion of security through obscurity.
- December 05, 2006
As director of training and certification for the Bethesda, Md.-based SANS Institute, Stephen Northcutt is always looking for better ways to prepare IT professionals for the threats of cyberspace. This year's SANS Top 20 Attack Targets list has ...
- February 10, 2006
Safend Protector lets you define who can use USB ports, what those ports can be used for and who can use wireless connections.
- August 02, 2005
The Netscreen-5GT Wireless is a great deal for SMBs and branch offices on a budget, according to Information Security's technical reviewer.
- July 14, 2005
The authentication tool is open to flaws attackers could use to cause a denial of service or launch malicious code.
- April 28, 2005
Haven't deployed Wi-Fi? Your network could still be vulnerable.
- March 23, 2005
Will Bluetooth share the security reputation Microsoft has suffered from?
- March 09, 2005
A look at how the U.S. Senate CIO is removing rogue access points created by the staffs of some very powerful people.
- September 29, 2004
Despite security improvements, two men who helped shape 802.11i warn wireless networking is still a risky business.
- September 02, 2004
Enterprises can learn a lesson or two about Wi-Fi implementation from from this summer's national political conventions.
- August 12, 2004
They're cheap and mobile and coming to a store near you. But inexpensive radio frequency identification tags could cost us. A report on the latest approaches to taming RFID devices from the USENIX Security Symposium.
- May 04, 2004
A security bypass may be the first of similar exploits on cellular phones and other devices sophisticated enough to use Java technology.
- February 23, 2004
Two recent Bluetooth vulnerabilities should prompt security managers to reexamine their companies' deployment of the short-range wireless technology.
- June 04, 2003
A SearchSecurity.com editor goes on a war drive in Washington, D.C. and sees firsthand the extent to which wireless networks are not secure.
- September 23, 2002
WLANs are inevitable, security measures a must