News

Wireless networking

  • March 22, 2007 22 Mar'07

    11n will boost speed, prompt upgrades

    802.11n's speed will be a welcome boost for end-users, but will create headaches as admins face network upgrades to deal with the demand for bandwidth it unleashes.

  • March 11, 2007 11 Mar'07

    Wi-Fi interference

    In this research report, undertook the challenge to quantify the problem of interference in wireless LANs and defined a methodology for evaluating the effects of interference on WLANs.

  • February 28, 2007 28 Feb'07

    RFID cloning presentation moves forward despite legal threats

    Chris Paget, director of research and development at IOActive spoke mainly about the science behind RFID tags and readers and the inherent security issues of the technology.

  • February 27, 2007 27 Feb'07

    Black Hat presenter nixes RFID cloning demo under pressure

    A demonstration of a device that could easily clone radio frequency identification (RFID) badges, was pulled from a conference presentation under pressure from a chip maker.

  • December 18, 2006 18 Dec'06

    Cisco WLAN design best practices

    Wireless LAN (WLAN) technology has built-in security features, but a one-size-fits-all approach won't ensure adequate security for your organization. This tip provides best practices for designing your security architecture, including user community...

  • December 11, 2006 11 Dec'06

    SIP desktop phone blends functionality, style

    VoIP desktop phones are no longer the clunky hunks of plastic that take up space on your desk. Siemens yesterday launched a new family of SIP phones that are as slick as they are functional.

  • November 28, 2006 28 Nov'06

    Effective wireless security is available, but holes exist

    Specialist vendors offer products that allow even small businesses to run a secure wireless network without paying a high price, but that doesn't mean companies are using it.

  • October 30, 2006 30 Oct'06

    Wireless network security testing

    The abundance of wireless devices is making wireless networks -- both authorised and unauthorised -- more common. Attack your own wireless networks to find vulnerabilities before malicious hackers do. Security testing expert Kevin Beaver covers the ...

  • October 15, 2006 15 Oct'06

    Flaw found in Toshiba wireless device driver

    Attackers could exploit a flaw in the Toshiba Bluetooth wireless device driver to cause a denial of service or launch malicious code on victims' machines.

  • October 03, 2006 03 Oct'06

    Cisco, Cognio team up on Wi-Fi interference detection

    Cisco and Cognio have partnered to troubleshoot and diagnose problems on the Wi-Fi network.

  • October 03, 2006 03 Oct'06

    Cisco, Cognio team up on Wi-Fi interference detection

    Cisco and Cognio have partnered to troubleshoot and diagnose problems on the Wi-Fi network.

  • September 14, 2006 14 Sep'06

    Set up an ad hoc WiFi network

    What if you wanted to do pretty much everything you can do on a network, but didn't have a router? You can set up an ad hoc network, in which you can connect on a peer-to-peer basis with other computers and PDAs. You don't need any extra software; ...

  • September 06, 2006 06 Sep'06

    VoIP startup untethers would-be mobile workers from wireline office phones

    VoIP startup DiVitas Networks has voice-over-WiFi-to-cellular technology in the works that gives endusers access to enterprise apps and puts dual-mode handset management in the hands of network administrators.

  • September 05, 2006 05 Sep'06

    ControlGuard targets rogue devices

    ControlGuard Access Manager is an effective tool for controlling what devices users can add to their workstations and how they are used.

  • August 14, 2006 14 Aug'06

    Wireless security boost for laptops outside the office

    >Most companies do a pretty good job with wireless security within the office walls, but what happens when end users take their laptops home -- or to Starbucks?

  • August 02, 2006 02 Aug'06

    RFID security issues are cause for corporate concern

    Although small in nature, RFID tags could be used to attack databases and corrupt critical information. It's a growing concern as corporate RFID use skyrockets, yet experts say there are reasonable ways to mitigate the risks and gain the business ...

  • July 26, 2006 26 Jul'06

    Blue Cross bears burden of 'no wireless' policy

    Blue Cross of Idaho had a "no wireless" policy on paper but never really enforced it. That is, until a team of auditors said the company had better do something.

  • November 28, 2005 28 Nov'05

    Step 6: Configuring wireless clients

    With wireless networks proliferating it is a good idea to understand what it takes to build a VPN for a wireless gateway. Contributor and Microsoft MVP Brien Posey details the necessary steps in this step-by-step guide.

  • November 21, 2005 21 Nov'05

    Wireless security: Public Wi-Fi could open security holes

    A Michigan county is working to give everyone within its borders wireless Internet access. But when it comes to security, users are on their own.

  • November 20, 2005 20 Nov'05

    Wireless security crucial to railway safety

    A transportation firm uses wireless technology to keep the trains running on time. But securing mobile devices isn't easy when they're spread across the globe.

  • November 16, 2005 16 Nov'05

    Wireless security: Companies deal with software updates

    A health care provider found it could use wireless technology to dramatically boost patient care. But first it had to figure out how to deploy security updates over a wireless network.

  • September 05, 2005 05 Sep'05

    Extending perimeters

    The news that, up until 2006, 70% of successful wireless local area network (WLAN) attacks will be because of the misconfiguration of WLAN access points and client software is disquieting on a number of levels.

  • May 11, 2005 11 May'05

    A new era of computer worms: Wireless mobile worms

    In this excerpt of Chapter 9 from "The Art of Computer Virus Research and Defense," author Peter Szor dissects the Cabir worm.

  • March 08, 2005 08 Mar'05

    Small businesses targeted with RFID

  • December 01, 2004 01 Dec'04

    Phreaks love Bluetooth

    Bluetooth is becoming the vector of choice for next-generation phone phreakers to swipe files from other users, make calls or render mobile phones completely useless.

  • May 23, 2004 23 May'04

    Hacking for Dummies: Chapter 10 -- Wireless LANs

    Read Chapter 10, Wireless LANs, from the book "Hacking for Dummies" written by Kevin Beaver.

  • November 15, 2000 15 Nov'00

    Wap usage: Planes, phones and automobiles



    So your globe-trotting executives want to change their itineraries in mid-journey and need to check that their revised schedules still fit with corporate...