LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Security Week: August 25th, 2014
Linux Advisory Watch: August 15th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Wireless Security
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.



World's Largest Secure Wireless Access Network  07 February 2005 
Source: 3g.co.uk - Posted by Benjamin D. Thomas   
GoRemote Internet Communications further extended its leadership in delivering managed secure remote access solutions by unveiling the world's largest and most comprehensive secure wireless access network. GoRemote is the first to offer a single solution for mobile users to obtain secure remote connectivity using virtually any type of wireless access, including free Wi-Fi hotspots, in-flight Wi-Fi, cellular and 3G.

 
'Evil twin' could pose Wi-Fi threat  26 January 2005 
Source: TechRepublic.com - Posted by Benjamin D. Thomas   
Researchers at Cranfield University are warning that "evil twin" hot spots, networks set up by hackers to resemble legitimate Wi-Fi hot spots, present the latest security threat to Web users. Attackers interfere with a connection to the legitimate network by sending a stronger signal from a base station close to the wireless client, turning the fake access point into a so-called evil twin.

 
Developer Raps Linux Security Developer Raps Linux Security  26 January 2005 
Source: LinuxInsider.com - Posted by Benjamin D. Thomas   
Brad Spengler of grsecurity characterized the Linux Security Model, or LSM, as merely a way to allow the National Security Agency's SELinux to be used as a module. "The framework is unfit for any security system that does anything remotely innovative, such as grsecurity and RSBAC [Rule Set-Based Access Control]," he declared.

 
Securing Your Starbucks Experience  21 January 2005 
Source: Wayne Rash - Posted by Joe Shakespeare   
The original plan for this column was to write it at my neighborhood Starbucks while sipping down some good old French Roast and getting my blood caffeine level into the quadruple digits. Alas, it was not to be. My T-Mobile account seems to have expired; the Washington, DC, area was clobbered by a massive 3-inch snowfall, making travel impossible; and worst of all, Starbucks has all those high-carb goodies there at the coffee counter. I couldn't take the risk.

 
Wi-Fi Boom Makes Life Easier for Computer Hackers  20 January 2005 
Source: Reuters staff - Posted by Joe Shakespeare   
Wireless networks giving computer users Internet access from anywhere in the home could expose them to eavesdropping, and programmers should make their security software easier to use, researchers say.

 
'Evil Twin' Haunts Wi-Fi Users  20 January 2005 
Source: Matthew Broersma - Posted by Joe Shakespeare   
An IT security expert, an academic and the U.K. government's cybercrime unit will give Londoners an introduction to the security dangers of wireless networking on Thursday—with the star of the show being an attack method dubbed the "Evil Twin."

 
Build a wireless network sniffer  18 January 2005 
Source: Peter Seebach - Posted by Frank   
This article reviews common issues of wireless security, and shows how to use open source software to suss out wireless networks, get information about them, and start recognizing common security problems. You will learn how to build a lightweight wireless sniffer that runs on open source software and, see how simple it is to interact with wireless networks.
 
US slaps on the wardriver-busting paint  17 January 2005 
Source: Lester Haines - Posted by Joe Shakespeare   
Security-minded US decorators' supply outfit Force Field Wireless claims to have developed a DIY solution to the international menace of marauding geek wardrivers - DefendAir paint "laced with copper and aluminum fibers that form an electromagnetic shield, blocking most radio waves and protecting wireless networks".

 
New Cell Phone Malware Packs Double Punch  11 January 2005 
Source: Ryan Naraine - Posted by Joe Shakespeare   
Anti-virus researchers have issued warnings for yet another strain of malware affecting Symbian smart phone devices, the latest using a combination of tactics to spread.

 
Bluetooth viruses pose growing threat  06 January 2005 
Source: Ingrid Marson - Posted by Joe Shakespeare   
There will also be a change in the way that viruses are spread, they say, with an increase in the number of viruses that spread wirelessly between devices, including viruses that can exploit the wireless capabilities of laptops.

 
<< Start < Prev 22 23 24 Next > End >>

Results 221 - 230 of 243
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.