Wireless and mobile security

In this guide, get advice on tools, software and tactics for wireless network security and wireless mobile device security. Learn how to build and maintain a secure wireless LAN, how to protect mobile devices, and how to successfully configure, implement and manage a solid wireless network.

Wireless and mobile security News

  • April 12, 2019 12 Apr'19

    WPA3 flaws found in Dragonfly handshake

    Researchers discovered vulnerabilities in the WPA3 protocol, specifically in the Dragonfly handshake authentication, allowing for multiple exploits branded Dragonblood.

  • April 11, 2019 11 Apr'19

    Huawei security questioned around the world

    Troubles continue for Huawei as new bans and government reports put security into question, but the company is attempting to fight back against the criticism.

  • April 10, 2019 10 Apr'19

    Nokia: 5G network slicing could be a boon for security

    According to Nokia's Kevin McNamee, the rise of 5G will mean more danger of IoT botnets, but also more options to secure those devices -- including using network slicing for segmentation.

  • February 26, 2019 26 Feb'19

    Android brings FIDO2 certification to 1 billion devices

    The FIDO Alliance announced Android has received FIDO2 certification, which will bring the ability to sign into websites and apps with biometrics, rather than passwords.

View All News

Wireless and mobile security Get Started

Bring yourself up to speed with our introductory content

  • secure container

    A secure container is a lightweight, executable software package that has been isolated from other software or processes running on the same virtual or physical host. Continue Reading

  • smart card

    A smart card is a physical card that has an embedded integrated chip that acts as a security token. Continue Reading

  • one-time password (OTP)

    A one-time password (OTP) is an automatically generated numeric or alphanumeric string of characters that authenticates the user for a single transaction or login session. Continue Reading

View All Get Started

Evaluate Wireless and mobile security Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

View All Evaluate

Manage Wireless and mobile security

Learn to apply best practices and optimize your operations.

View All Manage

Problem Solve Wireless and mobile security Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

View All Problem Solve

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

Close