LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Security Week: April 21st, 2014
Linux Security Week: April 7th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Wireless Security
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.



Mesh Networking Soars to New Heights  19 February 2005 
Source: XTVWorld - Posted by Benjamin D. Thomas   
Mesh Networking and community wireless broadband reached new heights with a world first for Locustworld MeshAP PRO when a Shadow microlight aircraft flew over Lincolnshire UK and successfully tested air to ground mesh networking and voice over broadband. South Witham broadband (Lincolnshire UK) joined forces with Make Me Wireless (Australia) and using LocustWorld MeshAP PRO and Asterisk VoIP equipment, seamlessly created air to ground voice communications at 2000 feet with the 16 node South Witham community broadband network.

 
Teething problems for wireless LANs  17 February 2005 
Source: Reseller.co.nz - Posted by Benjamin D. Thomas   
WIRELESS LAN is an emerging trend, but as with most young technologies, it is plagued by insecurities. John Martin, IBM principal security specialist and security practice leader, spends his days advising corporate enterprises on risk management. “The whole end-to-end process must be secure, regardless of the type of industry,? he says.

 
Wi-Fi Alliance to beef up security  14 February 2005 
Source: theregister.co.uk - Posted by Vincenzo Ciaglia   
Security remains the key issue deterring enterprise users from making major investments in Wi-Fi, despite all the improvements over the past year. Whether real or perceived, the security risks of wireless LANs are still holding deployments back. Conscious of this, the Wi-Fi Alliance is trying to beef up standard security still further. It has already agreed to a dual-layer security approach, with WPA2 (the brand name for the 802.11i standard) supporting advanced functions including AES encryption, while the more basic WPA – originally an interim standard en route to 802.11i – will be kept for devices that require less stringent security and lower costs, particularly in the consumer space.


 
WLAN Users Lack Support  14 February 2005 
Source: eweek.com - Posted by Vincenzo Ciaglia   
Setting up a wireless LAN can be as easy as sticking a plug into an outlet. But even technology-savvy customers are complaining that security can be a hassle due to problems with documentation and support. While industry standards bodies are making strides to ensure that even consumer-level WLAN hardware is effective and secure, the user manuals that come with the hardware continue to leave a lot to be desired. "The biggest challenge is inconsistent nomenclature and presentation of the basic components," said Christopher Bell, a software developer in Los Angeles whose home-office WLAN has included wireless routers from Linksys Inc. and Microsoft Corp. as well as myriad PC brands.


 
World's Largest Secure Wireless Access Network  07 February 2005 
Source: 3g.co.uk - Posted by Benjamin D. Thomas   
GoRemote Internet Communications further extended its leadership in delivering managed secure remote access solutions by unveiling the world's largest and most comprehensive secure wireless access network. GoRemote is the first to offer a single solution for mobile users to obtain secure remote connectivity using virtually any type of wireless access, including free Wi-Fi hotspots, in-flight Wi-Fi, cellular and 3G.

 
'Evil twin' could pose Wi-Fi threat  26 January 2005 
Source: TechRepublic.com - Posted by Benjamin D. Thomas   
Researchers at Cranfield University are warning that "evil twin" hot spots, networks set up by hackers to resemble legitimate Wi-Fi hot spots, present the latest security threat to Web users. Attackers interfere with a connection to the legitimate network by sending a stronger signal from a base station close to the wireless client, turning the fake access point into a so-called evil twin.

 
Developer Raps Linux Security Developer Raps Linux Security  26 January 2005 
Source: LinuxInsider.com - Posted by Benjamin D. Thomas   
Brad Spengler of grsecurity characterized the Linux Security Model, or LSM, as merely a way to allow the National Security Agency's SELinux to be used as a module. "The framework is unfit for any security system that does anything remotely innovative, such as grsecurity and RSBAC [Rule Set-Based Access Control]," he declared.

 
Securing Your Starbucks Experience  21 January 2005 
Source: Wayne Rash - Posted by Joe Shakespeare   
The original plan for this column was to write it at my neighborhood Starbucks while sipping down some good old French Roast and getting my blood caffeine level into the quadruple digits. Alas, it was not to be. My T-Mobile account seems to have expired; the Washington, DC, area was clobbered by a massive 3-inch snowfall, making travel impossible; and worst of all, Starbucks has all those high-carb goodies there at the coffee counter. I couldn't take the risk.

 
Wi-Fi Boom Makes Life Easier for Computer Hackers  20 January 2005 
Source: Reuters staff - Posted by Joe Shakespeare   
Wireless networks giving computer users Internet access from anywhere in the home could expose them to eavesdropping, and programmers should make their security software easier to use, researchers say.

 
'Evil Twin' Haunts Wi-Fi Users  20 January 2005 
Source: Matthew Broersma - Posted by Joe Shakespeare   
An IT security expert, an academic and the U.K. government's cybercrime unit will give Londoners an introduction to the security dangers of wireless networking on Thursday—with the star of the show being an attack method dubbed the "Evil Twin."

 
<< Start < Prev 22 23 24 Next > End >>

Results 211 - 220 of 237
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Fixing OpenSSL's Heartbleed flaw will take MONTHS, warns Secunia
Even the most secure cloud storage may not be so secure, study finds
Targeted Attack Uses Heartbleed to Hijack VPN Sessions
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.