LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Advisory Watch: August 29th, 2014
Linux Security Week: August 25th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Wireless Security
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.



The Non-Wireless Wireless Network Monitoring System  12 September 2005 
Source: BBW Exchange - Posted by Benjamin D. Thomas   
This new Linux-based wireless intrusion detection system is aimed at stopping a network's security from being compromised by detecting the installation of unauthorized access points. The wireless detection system utilizes wireless drones to develop a wireless network solely to detect any wireless signals that emanate from within their workplace. By incorporating a GPS module the location of any intruding device can be pinpointed. A standard web interface allows the administrator to monitor network usage; the system uses e-mail and pop-up alerts to signal possible intrusions of the network.

 
The Mobility Threat  05 September 2005 
Source: CIO Asia - Posted by Benjamin D. Thomas   
We live in an era where mobile devices are being used by all levels of society. Today, it is fairly common to see a CEO or a school kid carrying a PDA or mobile phone. According to a survey by Infocomm Authority of Singapore (IDA), the penetration rate of mobile phones in Singapore has grown to 91 percent in 2004. Sophisticated PDA phones and other mobile devices such as the Blackberry are actually miniaturised PCs and they have become ubiquitous.

 
Creating Security Policies That Work for Your Company  01 September 2005 
Source: IT Business Edge - Posted by Benjamin D. Thomas   
This week, our discussion on security and compliance continues with Julian Waits, president and CEO of Brabeion Software, which provides enterprise-class software for creating, managing and deploying IT security policies, with support for a wide range of technologies from leading vendors, including Microsoft, Cisco, Oracle and Red Hat Linux.

 
Linux Security, Audit and Control Guidance Featured In New Book from ISACA  19 August 2005 
Source: i-Newswire - Posted by Benjamin D. Thomas   
More than 10 years after its debut, Linux has matured from a student hobby to a highly respected platform used by major organizations worldwide. Because of this growing popularity and increased legislation requiring tight controls over IT, the Information Systems Audit and Control Association (ISACA) has issued a new publication with detailed guidance on security, audit and control of Linux.

 
Sean Moshir on Wireless Security and Compliance  08 August 2005 
Source: Sean Moshir - Posted by Benjamin D. Thomas   
In this interview, Sean Moshir, PatchLink Chief Executive Officer discusses security patching, vulnerability and compliancy management for wireless phones and PDA devices and talks about the current state and future of wireless security in the enterprise.

 
Wireless Data Transmission Security  05 August 2005 
Source: flexbeta.net - Posted by Pax Dickinson   
The main purpose of our paper is to describe the various forms of wireless data transmission and to address the security concerns in each. The major form of wireless data transmission that we will be covering will be Wi-Fi. We will discuss security concerns, how to protect yourself, the future of Wi-Fi, and what it is used for in today’s world.

 
Passing the conference 'sniff' test  05 August 2005 
Source: SearchSecurity - Posted by Pax Dickinson   
At last year's USENIX Security Symposium, Marcus Ranum was minding his own business -- checking his e-mail, updating his Web site, etc. -- when another conference attendee sent him an e-mail. In the text: Ranum's password. Ranum, known for his work in intrusion detection, later angrily confronted the sender at the conference about invading his privacy. Bill Cheswick, a well-known security expert who sent the offensive message, later chalked up his actions as just "a friendly nudge."

 
Hackers Say Wireless Is Weak  04 August 2005 
Source: LightReading.com - Posted by Pax Dickinson   
Lock down your wireless network -- that’s the message coming loud and clear now that the DefCon hacker convention has rolled through Las Vegas. Jesse Krembs, president of The Hacker Foundation, who spoke at the show, warned that wireless is the weak under-belly of many businesses. “I think that the main thing that people will be looking at is more wireless hacking,? he says.

 
Hackers cash in on 802.1x confusion  03 August 2005 
Source: IT Week - Posted by Pax Dickinson   
Companies are leaving their wireless networks exposed to hackers because of widespread failure to understand or implement 802.11x security systems, a survey has claimed.

 
The Threat From Within  02 August 2005 
Source: Network Magazine - Posted by Benjamin D. Thomas   
Malicious insiders represent today's toughest challenge for security architects. Traditional database security tools such as encryption and access controls are rendered useless by a trusted employee who has--or can easily obtain--the right credentials. In addition, more users in the enterprise are getting database access, including DBAs, application developers, software engineers, and even marketing, HR, and customer support representatives. And whether spurred by revenge or tempted by easy money, insiders can sell their booty on a bustling information black market.

 
<< Start < Prev 19 20 21 Next > End >>

Results 191 - 200 of 243
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Mozilla reports user data leak from Bugzilla project
These 3-D Printed Skeleton Keys Can Pick High-Security Locks in Seconds
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.