LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Security Week: July 28th, 2014
Linux Advisory Watch: July 25th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Wireless Security
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.



United States Air Force Enforces Mobile Security Using Senforce  04 January 2005 
Source: Michael - Posted by Joe Shakespeare   
DRAPER, Utah --(Business Wire)-- Jan. 4, 2005 Disables Wireless When Users Are Connected to the Wired Network, Keeping Intruders Out

 
Spam Punishment Doesn't Fit the Crime  28 December 2004 
Source: securityfocus.com - Posted by Vincenzo Ciaglia   
I hate spam as much as the next person, but recent decisions by courts in Iowa and Virginia demonstrate how fear of technology (and justifiable annoyance) can force the legal system to impose fines and sentences that are grossly disproportionate to the harm caused by spammers. This is not to defend or justify spammers, whose actions are at best deceptive, almost always annoying, generally illegal and frequently criminal. But when people who send e-mail are punished more harshly than those who commit war crimes in Rwanda, and are fined more than companies that destroy the environment, it's time to revisit our strategy.


 
Wi-Fi Hacker Sentenced To Nine Years  17 December 2004 
Source: TechWeb News - Posted by Joe Shakespeare   
A 21-year-old Michigan man was sentenced Wednesday to nine years in prison for breaking into the network of home improvement retailer Lowe's, the longest jail term ever handed out in the U.S. for hacking.

 
WEP: Dead Again, Part 1  15 December 2004 
Source: Michael Ossmann - Posted by Joe Shakespeare   
This article is the first of a two-part series that looks at the new generation of WEP cracking tools for WiFi networks, which offer dramatically faster speeds for penetration testers over the previous generation of tools. In many cases, a WEP key can be determined in seconds or minutes. Part one, below, compares the latest KoreK based tools that perform passive statistical analysis and brute-force cracking on a sample of collected WEP traffic. Next time, in part two, we'll look at active attack vectors, including a method to dramatically increase the rate of packet collection to make statistical attacks even more potent.

 
Securing Wireless E-Records  13 December 2004 
Source: George V. Hulme - Posted by Joe Shakespeare   
Few understand how tough it can be to lock down wireless networks better than Stephen Lewack, director of technical services and communications at Columbus Regional Healthcare System. Lewack is protecting a growing number of wireless devices throughout the Georgia hospital, which includes more than 400 in-patient beds, more than 200 long-term care beds, and a pharmacy.

 
Wi-Fi phones are on your network, like it or not  10 December 2004 
Source: Matthew Broersma - Posted by Joe Shakespeare   
Wireless LAN-enabled mobile phones and handhelds are on the way, whether network administrators are ready for them or not.

 
Interlink Expands Small Business Wireless Security Offering  07 December 2004 
Source: Small Biz Pipeline - Posted by Joe Shakespeare   
Interlink Networks announced Tuesday that it has released version 2.0 of its LucidLink Wireless Security solution. The software now supports businesses with up to 250 wireless users working on Windows 2000 or Windows XP PCs.

 
Mobile & Wireless: Security was the Watchword in 2004  01 December 2004 
Source: Carol Ellison - Posted by Joe Shakespeare   
It's no surprise that the issue that topped the Wi-Fi agenda in 2004 was the same one that's plagued it almost from its introduction. Security, or rather "lack thereof," was an inherent problem in WEP (Wired Equivalent Privacy), the native security spec in the 802.11 IEEE standard.

 
Carrying On: Improve Security With Wireless  13 October 2004 
Source: NWC.COM - Posted by Mark Rechler   
I'm standing at the security guard's station. In the now-familiar corporate front-desk ritual, I sign the log book. The guard doesn't ask for my ID. I might have signed my own name, or I might have signed as Osama bin Laden, for all he knows. He doesn't look at what I'm carrying. He doesn't know or care about the camera phone in my pocket. Still, he hands me a paper sticker that says "Visitor" in red block letters. Armed with my badge of trustworthiness, I go on in. . . .
 
T-Mobile boosts public WLAN security  06 October 2004 
Source: theregister.co.uk - Posted by Vincenzo Ciaglia   
T-Mobile has begun using 802.1x security to authenticate users logging on to its US pubic Wi-Fi hotspots in a bid to make it harder for hackers to obtain legitimate users' names and passwords. . . .
 
<< Start < Prev 22 23 24 Next > End >>

Results 231 - 240 of 242
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Ottawa Linux Symposium: May get by with a little help from its friends
Black Hat 2014: How to crack just about everything
NSA Playset, 911 hacked and war cats: A wild ride at DEF CON 22
More Details of Onion/Critroni Crypto Ransomware Emerge
Is there Another NSA Leaker? Updated
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.