Tag Cloud

Bloggers

Blog

Follow and talk to Infosecurity's bloggers.

Follow Infosecurity's bloggers as they share their thoughts on the industry, technology, and much more. Our bloggers have been selected for their industry expertise. They welcome interaction, so we encourage you to add your opinions to theirs.

3
comments
  Even after the world has witnessed major Wi-Fi security incidents, such as Google’s Wi-Fi snooping controversy, a recent survey has indicated that WEP based Wi-Fi networks are still operational in large numbers, even though, WEP, at present, is widely understood as an easily broken sec ...
Posted 07 September 2012 by Ajay Gupta
0
comments
  Recently HTC acknowledged a vulnerability that can expose a user’s WiFi credentials, including the WiFi SSID and security passwords to a malicious app running on some of its Android phones. The vulnerability was discovered by the security architects Chris Hessing and Bret Jordan, and i ...
Posted 03 February 2012 by Ajay Gupta
0
comments
Enabling WPS Can Make You Vulnerable
Adding to the users convenience, Wi-Fi is increasingly becoming a default capability of many consumer devices, including smartphones, printers, cameras, TVs, etc. to wirelessly share contents, access Internet or connect to a particular network.   However, configuring the correct Wi-Fi settings ...
Posted 29 December 2011 by Ajay Gupta
0
comments
WiFi security remained in focus with noticeable and widely discussed incidents and revelations happening all throughout the year. These events will surely provide strong testimony for advocating the importance of secure WiFi deployments/usage in coming years. The importance can be judged against the ...
Posted 28 December 2010 by Ajay Gupta
0
comments
  WiFi, today, has become a near ubiquitous technology, used by most of us, with our WiFi enabled gadgets, while we are at offices, homes, public places or while traveling. However, awareness about WiFi security is still lacking and practice of configuring poorly secured or unsecured WiFi netw ...
Posted 05 July 2010 by Ajay Gupta
Showing 1 - 5 of 5 blogs
View the RSS feed for this blog »
We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×