LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Security Week: April 7th, 2014
Linux Advisory Watch: April 4th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Wireless Security
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.



Passing the conference 'sniff' test  05 August 2005 
Source: SearchSecurity - Posted by Pax Dickinson   
At last year's USENIX Security Symposium, Marcus Ranum was minding his own business -- checking his e-mail, updating his Web site, etc. -- when another conference attendee sent him an e-mail. In the text: Ranum's password. Ranum, known for his work in intrusion detection, later angrily confronted the sender at the conference about invading his privacy. Bill Cheswick, a well-known security expert who sent the offensive message, later chalked up his actions as just "a friendly nudge."

 
Hackers Say Wireless Is Weak  04 August 2005 
Source: LightReading.com - Posted by Pax Dickinson   
Lock down your wireless network -- that’s the message coming loud and clear now that the DefCon hacker convention has rolled through Las Vegas. Jesse Krembs, president of The Hacker Foundation, who spoke at the show, warned that wireless is the weak under-belly of many businesses. “I think that the main thing that people will be looking at is more wireless hacking,? he says.

 
Hackers cash in on 802.1x confusion  03 August 2005 
Source: IT Week - Posted by Pax Dickinson   
Companies are leaving their wireless networks exposed to hackers because of widespread failure to understand or implement 802.11x security systems, a survey has claimed.

 
The Threat From Within  02 August 2005 
Source: Network Magazine - Posted by Benjamin D. Thomas   
Malicious insiders represent today's toughest challenge for security architects. Traditional database security tools such as encryption and access controls are rendered useless by a trusted employee who has--or can easily obtain--the right credentials. In addition, more users in the enterprise are getting database access, including DBAs, application developers, software engineers, and even marketing, HR, and customer support representatives. And whether spurred by revenge or tempted by easy money, insiders can sell their booty on a bustling information black market.

 
Wireless hijacking under scrutiny  01 August 2005 
Source: BBC News - Posted by Pax Dickinson   
A recent court case, which saw a West London man fined £500 and sentenced to 12 months' conditional discharge for hijacking a wireless broadband connection, has repercussions for almost every user of wi-fi networks.

 
Is wireless security pointless?  21 July 2005 
Source: SearchSecurity - Posted by Pax Dickinson   
What with country singer Lee Greenwood's recorded rendition of patriot songs like "Glory, Glory, Hallelujah" and "God Bless America" playing over the sound system at 8:30 a.m. in the Commerce Department auditorium in Washington, D.C., one could have been excused for thinking the July 20 conference: "Pharmers and Spimmers, Hackers and Bluejackers: Combating Wireless Security Threats" was taking place during a national emergency. Far from it.

 
Noisy party: complainant arrested for stealing?  11 July 2005 
Source: The I-Kew - Posted by Pax Dickinson   
The basic facts are that Benjamin Smith III used someone else's WiFi network. The facts aren't in dispute; Smith parked his vehicle outside the home of Richard Dinon, logged onto the network, and did some surfing.

"Surprise! Stealing is illegal!" bellowed Larry Seltzer in his ZD security blog.

 
Wi-Fi mooching and the law  08 July 2005 
Source: CNET News - Posted by Pax Dickinson   
The recent arrest of a Florida man on charges of unauthorized use of a wireless network could set legal ground rules for open Wi-Fi access.

A man sitting in a Chevy Blazer in a residential neighborhood reportedly was poking around nearby wireless networks in violation of computer crime laws, according to local police.

 
Mobile & Wireless World to focus on Wi-Fi, security, RFID  14 June 2005 
Source: ComputerWorld - Posted by Benjamin D. Thomas   
When it comes to mobile and wireless technology, what keeps a CIO up at night? John Wade, CIO of the Saint Luke's Health System in Kansas City, Mo., said he faces many of the same problems confronting other CIOs when it comes to supporting mobile and wireless technology in a large organization. Wade is one of 25 senior IT managers making presentations at Computerworld's Mobile & Wireless World conference this week in Scottsdale, Ariz. The event kicks off today, with an expected audience of about 300 attendees, including many senior IT managers, organizers said.

 
Cracking WEP in 10 minutes  08 June 2005 
Source: Jon Udell's Weblog - Posted by Pax Dickinson   
Yesterday I started noticing referral traffic from myscreencast.com, a phpbb-based community site for finding and sharing screencasts. The most entertaining one I found is called Cracking WEP in 10 minutes. It was produced with Camtasia, but the action takes place in Whoppix, which describes itself thusly:

Whoppix is a stand alone penetration testing live cd based on Knoppix. With the latest tools and exploits, it is a must for every penetration tester and security auditor.

 
<< Start < Prev 19 20 21 Next > End >>

Results 191 - 200 of 237
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
'Snowden effect' has changed cloud data security assumption, survey claims
Galaxy S5 fingerprint scanner hacked with glue mould
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.