Ajay Gupta

Job title:
WLAN access and security specialist

Areas of expertise:
wireless security, mobile security, WiFi access

Biography:
Ajay Gupta has been in the field of wireless security for more than six years and is a frequent contributor to some leading security magazines for columns and articles related to wireless access and security. He holds a master's of technology degree from IIT Bombay in India.

Tag Cloud

Bloggers

Blog

Follow and talk to Infosecurity's bloggers.

Follow Infosecurity's bloggers as they share their thoughts on the industry, technology, and much more. Our bloggers have been selected for their industry expertise. They welcome interaction, so we encourage you to add your opinions to theirs.

All Bloggers » Ajay Gupta
3
comments
  Even after the world has witnessed major Wi-Fi security incidents, such as Google’s Wi-Fi snooping controversy, a recent survey has indicated that WEP based Wi-Fi networks are still operational in large numbers, even though, WEP, at present, is widely understood as an easily broken sec ...
Posted 07 September 2012 by Ajay Gupta
0
comments
  Recently HTC acknowledged a vulnerability that can expose a user’s WiFi credentials, including the WiFi SSID and security passwords to a malicious app running on some of its Android phones. The vulnerability was discovered by the security architects Chris Hessing and Bret Jordan, and i ...
Posted 03 February 2012 by Ajay Gupta
1
comment
After mentioning briefly about the recently discovered Wi-Fi Protected Setup (WPS) vulnerability due to certain design flaws in various routers of major Wi-Fi Vendors, the present blog tries to capture the potential implications of the WPS vulnerability. Unauthorized Access to Wi-Fi network: With t ...
Posted 09 January 2012 by Ajay Gupta
0
comments
Enabling WPS Can Make You Vulnerable
Adding to the users convenience, Wi-Fi is increasingly becoming a default capability of many consumer devices, including smartphones, printers, cameras, TVs, etc. to wirelessly share contents, access Internet or connect to a particular network.   However, configuring the correct Wi-Fi settings ...
Posted 29 December 2011 by Ajay Gupta
0
comments
Google recently announced an approach to provide Wi-Fi Access Point owners an option to opt-out from the Google Location server, thereby addressing specific privacy concerns of certain Access Point owners, and of the users in the coverage area of specific Access Point(s). Location based services ( ...
Posted 20 November 2011 by Ajay Gupta
0
comments
False Sense of Security among WiFi Users
A recent survey conducted by Wakefield Research for the WiFi Alliance has revealed that 97% of surveyed WiFi users believe that the data on their devices and networks is “safe and secure”. However, when questioned further about various steps taken to secure their WiFi networks or devices ...
Posted 11 October 2011 by Ajay Gupta
0
comments
In a recently released report titled “Wi-Fi Positioning Systems: Beware of Unintended Consequences”  – by Ontario's Information and Privacy Commissioner, Dr. Ann Cavoukian, and Kim Cameron, a leading digital identity expert – indicates that availability of mobile device ...
Posted 16 June 2011 by Ajay Gupta
0
comments
Public WiFi hotspots have shown tremendous growth in recent years. Much of this can be attributed to growing number of people carrying smart mobile devices (such as smartphones and tablets) and using bandwidth-consuming internet applications (such as gaming, social networking sites and audio/video s ...
Posted 23 March 2011 by Ajay Gupta
1
comment
WiFi Hacking not Always a Cyber Crime
If someone is assuming that hacking/breaking into a WiFi router for piggybacking on the router’s internet connection is illegal, then he/she needs to double check the same with the applicable CyberLaw. This was highlighted in view of a recent WiFi hacking incident where a student broke into a ...
Posted 19 March 2011 by Ajay Gupta
0
comments
  WiFi security continues to hog the limelight with the series of related revelations and incidents happening periodically. And the latest in this series are the results of a online survey conducted by the UK's Information Commissioner’s Office (ICO) published recently, which revealed th ...
Posted 18 March 2011 by Ajay Gupta
1
comment
  Increased use of public WiFi access at hotspots, retail stores, hotels and other similar establishments has recently motivated New York Democrat, Sen. Charles Schumer, to call on major US website operators – including Amazon and Twitter – to switch to secure protocol (HTTPS) ...
Posted 28 February 2011 by Ajay Gupta
0
comments
WiFi security remained in focus with noticeable and widely discussed incidents and revelations happening all throughout the year. These events will surely provide strong testimony for advocating the importance of secure WiFi deployments/usage in coming years. The importance can be judged against the ...
Posted 28 December 2010 by Ajay Gupta
0
comments
 Firesheep is a recently released Firefox add-on/extension, developed by software freelancer Eric Butler. The intention behind the add-on was to expose the gravity of commonly found security vulnerability in many websites, particularly popular social networking sites, such as Facebook, Amazon, ...
Posted 16 November 2010 by Ajay Gupta
1
comment
Practicing Continuous PCI DSS Compliance
  The importance of ongoing/continuous PCI DSS compliance processes as an effective means to curb security breaches at a merchant’s site is being touted by many experts in the PCI field lately. Verizon's recommendations also mention this importance in it’s recently released report ...
Posted 07 October 2010 by Ajay Gupta
0
comments
  The Deadline to comply with PCI DSS requirements, set for Level 1 Merchants by VISA, recently passed on Sept. 30, 2010. However, what we do not yet know is how many of these merchants have successfully met the compliance requirements.   Knowing the ‘path to c ...
Posted 04 October 2010 by Ajay Gupta
0
comments
  The growing WiFi capability in the variety of consumer devices is readily evident nowadays. These devices include cameras, camcorders, printers, scanners, smartphones, televisions, music/video players, e-book readers and many more. Having been equipped with WiFi capability, these devices are ...
Posted 29 September 2010 by Ajay Gupta
0
comments
WPA2 Exposed with 'Hole 196' Vulnerability
Until now, the WPA security version known as ‘WPA2 (AES encryption) with 802.1x authentication’ was considered as one of most secure WiFi deployments by most wireless security experts. This is due to the resilience of this version to brute force dictionary attacks that can possibly ...
Posted 23 July 2010 by Ajay Gupta
0
comments
  WiFi, today, has become a near ubiquitous technology, used by most of us, with our WiFi enabled gadgets, while we are at offices, homes, public places or while traveling. However, awareness about WiFi security is still lacking and practice of configuring poorly secured or unsecured WiFi netw ...
Posted 05 July 2010 by Ajay Gupta
0
comments
Six months after McDonalds started offering free WiFi, Starbucks also announced it would provide complimentary WiFi service, starting July 1, 2010. As mentioned by Starbucks, the free WiFi will be unlimited and requires just one click, without the need of a username/password to go onl ...
Posted 01 July 2010 by Ajay Gupta
0
comments
As reported recently, Russian spies in US used private WiFi networks as a means for secret communications. These networks were found to be operating in the ad hoc mode (also knows as peer-to-peer mode) in which two or more WiFi clients can directly communicate with each other over WiFi links without ...
Posted 30 June 2010 by Ajay Gupta
Showing 1 - 20 of 22 blogs
View the RSS feed for this blog »
We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×