Tag Cloud



Follow and talk to Infosecurity's bloggers.

Follow Infosecurity's bloggers as they share their thoughts on the industry, technology, and much more. Our bloggers have been selected for their industry expertise. They welcome interaction, so we encourage you to add your opinions to theirs.

After mentioning briefly about the recently discovered Wi-Fi Protected Setup (WPS) vulnerability due to certain design flaws in various routers of major Wi-Fi Vendors, the present blog tries to capture the potential implications of the WPS vulnerability. Unauthorized Access to Wi-Fi network: With t ...
Posted 09 January 2012 by Ajay Gupta
Enabling WPS Can Make You Vulnerable
Adding to the users convenience, Wi-Fi is increasingly becoming a default capability of many consumer devices, including smartphones, printers, cameras, TVs, etc. to wirelessly share contents, access Internet or connect to a particular network.   However, configuring the correct Wi-Fi settings ...
Posted 29 December 2011 by Ajay Gupta
Google recently announced an approach to provide Wi-Fi Access Point owners an option to opt-out from the Google Location server, thereby addressing specific privacy concerns of certain Access Point owners, and of the users in the coverage area of specific Access Point(s). Location based services ( ...
Posted 20 November 2011 by Ajay Gupta
In a recently released report titled “Wi-Fi Positioning Systems: Beware of Unintended Consequences”  – by Ontario's Information and Privacy Commissioner, Dr. Ann Cavoukian, and Kim Cameron, a leading digital identity expert – indicates that availability of mobile device ...
Posted 16 June 2011 by Ajay Gupta
  The growing WiFi capability in the variety of consumer devices is readily evident nowadays. These devices include cameras, camcorders, printers, scanners, smartphones, televisions, music/video players, e-book readers and many more. Having been equipped with WiFi capability, these devices are ...
Posted 29 September 2010 by Ajay Gupta
Showing 1 - 5 of 5 blogs
View the RSS feed for this blog »
We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×