Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Sign up!
EnGarde Community
What is the most important Linux security technology?
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Latest Newsletters
Linux Advisory Watch: March 27th, 2015
Linux Security Week: March 23rd, 2015
LinuxSecurity Newsletters
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

Wireless Security
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Is wireless security pointless?  21 July 2005 
Source: SearchSecurity - Posted by Pax Dickinson   
What with country singer Lee Greenwood's recorded rendition of patriot songs like "Glory, Glory, Hallelujah" and "God Bless America" playing over the sound system at 8:30 a.m. in the Commerce Department auditorium in Washington, D.C., one could have been excused for thinking the July 20 conference: "Pharmers and Spimmers, Hackers and Bluejackers: Combating Wireless Security Threats" was taking place during a national emergency. Far from it.

Noisy party: complainant arrested for stealing?  11 July 2005 
Source: The I-Kew - Posted by Pax Dickinson   
The basic facts are that Benjamin Smith III used someone else's WiFi network. The facts aren't in dispute; Smith parked his vehicle outside the home of Richard Dinon, logged onto the network, and did some surfing.

"Surprise! Stealing is illegal!" bellowed Larry Seltzer in his ZD security blog.

Wi-Fi mooching and the law  08 July 2005 
Source: CNET News - Posted by Pax Dickinson   
The recent arrest of a Florida man on charges of unauthorized use of a wireless network could set legal ground rules for open Wi-Fi access.

A man sitting in a Chevy Blazer in a residential neighborhood reportedly was poking around nearby wireless networks in violation of computer crime laws, according to local police.

Mobile & Wireless World to focus on Wi-Fi, security, RFID  14 June 2005 
Source: ComputerWorld - Posted by Benjamin D. Thomas   
When it comes to mobile and wireless technology, what keeps a CIO up at night? John Wade, CIO of the Saint Luke's Health System in Kansas City, Mo., said he faces many of the same problems confronting other CIOs when it comes to supporting mobile and wireless technology in a large organization. Wade is one of 25 senior IT managers making presentations at Computerworld's Mobile & Wireless World conference this week in Scottsdale, Ariz. The event kicks off today, with an expected audience of about 300 attendees, including many senior IT managers, organizers said.

Cracking WEP in 10 minutes  08 June 2005 
Source: Jon Udell's Weblog - Posted by Pax Dickinson   
Yesterday I started noticing referral traffic from, a phpbb-based community site for finding and sharing screencasts. The most entertaining one I found is called Cracking WEP in 10 minutes. It was produced with Camtasia, but the action takes place in Whoppix, which describes itself thusly:

Whoppix is a stand alone penetration testing live cd based on Knoppix. With the latest tools and exploits, it is a must for every penetration tester and security auditor.

New hack cracks 'secure' Bluetooth devices  03 June 2005 
Source: New Scientist - Posted by Pax Dickinson   
Cryptographers have discovered a way to hack Bluetooth-enabled devices even when security features are switched on. The discovery may make it even easier for hackers to eavesdrop on conversations and charge their own calls to someone else’s cellphone.

An Easier Way To Secure Wireless Networks  23 May 2005 
Source: Security Pipeline - Posted by Pax Dickinson   
Best Buy reports that its most frequently returned products are Wi-Fi networking gear. While many end users want the benefits of Wi-Fi, apparently very few can figure out how to set the wireless security features and get them working properly. Even experienced networking pros have trouble configuring security on today's Wi-Fi networks.

VeriSign to put more backbone into the Net  20 May 2005 
Source: CNET News - Posted by Pax Dickinson   
VeriSign plans to significantly increase the number of DNS servers it operates, a move that it says will make a key part of the Internet's infrastructure more resilient to cyberattacks.

Over the next year, VeriSign aims to place additional replicas of one of its Domain Name System root servers--the "J"--in up to 100 data centers around the world, Aristotle Balogh, VeriSign's senior vice president of operations and infrastructure, said in an interview with CNET on Thursday. The company runs two of the DNS root servers--the "A" is the other--that form an essential part of the Internet's naming system.

Hotspot Hacking And How To Fight It  25 April 2005 
Source: Security Pipeline - Posted by Pax Dickinson   
Use of public wireless hotspots is increasing, giving mobile workers and others access to essential data. The bad news: Security threats against hotspot users also are increasing.

That's the word from Richard Rushing and he should know since he is chief security officer for AirDefense, which specializes in security of mobile workers.

Using Intrusion Detection Systems To Keep Your WLAN Safe  06 April 2005 
Source: Security Pipeline - Posted by Pax Dickinson   
Wireless LANs utilize radio waves for transporting information, which results in security vulnerabilities that justifiably worry network managers. To assuage those worries, most companies implement authentication and encryption to harden security.

However, WLANs have a whole host of other vulnerabilities that can be more difficult to completely smother such as illicit monitoring, unauthorized access, and denial of service (DoS) attacks. For example, someone using a wireless sniffer, such as the freely-available NetStumbler, can easily monitor wireless traffic for fun or malicious intent while sitting in their car next to your office building.

<< Start < Prev 22 23 24 Next > End >>

Results 211 - 220 of 252


Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2015 Guardian Digital, Inc. All rights reserved.