LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Advisory Watch: August 15th, 2014
Linux Advisory Watch: August 8th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Wireless Security
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.



Suspect in 'biggest cyber attack in history' had hack van, bunker  29 April 2013 
Source: The Age - Posted by Dave Wreski   
A Dutch citizen arrested in northeast Spain on suspicion of launching what is described as the biggest cyber attack in internet history operated from a bunker and had a van capable of hacking into networks anywhere in the country, officials said on Sunday.
 
Identifying People from Mobile Phone Location Data  26 March 2013 
Source: Schneier on Security - Posted by Dave Wreski   
Researchers at the Massachusetts Institute of Technology (MIT) and the Catholic University of Louvain studied 15 months' worth of anonymised mobile phone records for 1.5 million individuals.
 
Sandia Labs' MegaDroid Plays Security War Games  05 October 2012 
Source: Linux Insider - Posted by Dave Wreski   
A virtual network of 300,000 Android devices is roaming around an imaginary city, giving researchers at Sandia National Laboratories the chance to see how a wireless network operates in a microcosm. The purpose of the project, called "MegaDroid," is to enhance the security of wireless networks by exposing weaknesses.
 
How to hack your own Wi-Fi network  23 April 2012 
Source: PC World - Posted by Dave Wreski   
Attempting to "hack" into your own wireless network can help you spot potential Wi-Fi security vulnerabilities and figure out ways to protect against them.
 
Public Wi-Fi not as secure as you think  03 February 2012 
Source: KARE 11 - Posted by Anthony Pell   
In a world that is constantly connected, it seems these days you are never alone, whether you know it or not. "People are online around the clock," said computer expert Jake DeWoskin. DeWoskin is with the Twin Cities business consulting firm KDV.
 
Wi-Fi Protected Setup made easier to brute force  29 December 2011 
Source: H Security - Posted by Dave Wreski   
A researcher has found design flaws and poor implementation in WPS (Wi-Fi Protected Setup) which makes it much simpler to brute force the protection on Wi-Fi access points that use the technology. The discovery has prompted the US CERT to issue an advisory which suggests disabling WPS as a workaround for the problem.
 
Lock down your Wi-Fi network: 8 tips for small businesses  17 November 2011 
Source: IT World - Posted by Anthony Pell   
Wi-Fi gives us freedom from wires, but it's not secure by default. Data is transmitted through the air, and anyone nearby can easily capture it with the right tools. As discussed below, whether you have your own Wi-Fi network or use someone else's, employing security measures is necessary to protect company files, online accounts, and user privacy.
 
Wi-Fi security do's and don'ts  07 November 2011 
Source: Computer World AU - Posted by Dave Wreski   
Wi-Fi is inherently susceptible to hacking and eavesdropping, but it can be secure if you use the right security measures. Unfortunately, the Web is full of outdated advice and myths. But here are some do's and don'ts of Wi-Fi security, addressing some of these myths.
 
Wi-Fi users not as safe as they think, survey says  06 October 2011 
Source: CNET - Posted by Anthony Pell   
Among Wi-Fi users, there's a big gap between knowing about Wi-Fi security and keeping their network and devices secure, as revealed by the Wi-Fi Security Barometer Survey results that the Wi-Fi Alliance announced today.
 
Researchers develop botnet drone that targets Wi-Fi networks  09 September 2011 
Source: CBR Online - Posted by Dave Wreski   
SkyNET measures 13x18 inches and fitted with Wi-Fi, 3G mobile data link, and Linux OS. Researchers at the Stevens Institute of Technology have developed 'SkyNET', a stealth network that connects hosts to a botmaster through a mobile drone.
 
<< Start < Prev 1 2 3 Next > End >>

Results 11 - 20 of 243
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Attackers Can ‘Steal’ Bandwidth From BitTorrent Seeders, Research Finds
Linux Kernel Development Gets Two-Factor Authentication
Hacking cars and traffic lights at Def Con
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.