News
Wireless networking
- 
				August 02, 2006
				
					02
					Aug'06
				
RFID security issues are cause for corporate concern
Although small in nature, RFID tags could be used to attack databases and corrupt critical information. It's a growing concern as corporate RFID use skyrockets, yet experts say there are reasonable ways to mitigate the risks and gain the business ...
 - 
				July 26, 2006
				
					26
					Jul'06
				
Blue Cross bears burden of 'no wireless' policy
Blue Cross of Idaho had a "no wireless" policy on paper but never really enforced it. That is, until a team of auditors said the company had better do something.
 - 
				November 28, 2005
				
					28
					Nov'05
				
Step 6: Configuring wireless clients
With wireless networks proliferating it is a good idea to understand what it takes to build a VPN for a wireless gateway. Contributor and Microsoft MVP Brien Posey details the necessary steps in this step-by-step guide.
 - 
				November 21, 2005
				
					21
					Nov'05
				
Wireless security: Public Wi-Fi could open security holes
A Michigan county is working to give everyone within its borders wireless Internet access. But when it comes to security, users are on their own.
 
- 
			November 20, 2005
			
				20
				Nov'05
			
Wireless security crucial to railway safety
A transportation firm uses wireless technology to keep the trains running on time. But securing mobile devices isn't easy when they're spread across the globe.
 - 
			November 16, 2005
			
				16
				Nov'05
			
Wireless security: Companies deal with software updates
A health care provider found it could use wireless technology to dramatically boost patient care. But first it had to figure out how to deploy security updates over a wireless network.
 - 
			September 05, 2005
			
				05
				Sep'05
			
Extending perimeters
The news that, up until 2006, 70% of successful wireless local area network (WLAN) attacks will be because of the misconfiguration of WLAN access points and client software is disquieting on a number of levels.
 - 
			May 11, 2005
			
				11
				May'05
			
A new era of computer worms: Wireless mobile worms
In this excerpt of Chapter 9 from "The Art of Computer Virus Research and Defense," author Peter Szor dissects the Cabir worm.
 - 
			March 08, 2005
			
				08
				Mar'05
			
Small businesses targeted with RFID
 - 
			December 01, 2004
			
				01
				Dec'04
			
Phreaks love Bluetooth
Bluetooth is becoming the vector of choice for next-generation phone phreakers to swipe files from other users, make calls or render mobile phones completely useless.
 
- 
			May 23, 2004
			
				23
				May'04
			
Hacking for Dummies: Chapter 10 -- Wireless LANs
Read Chapter 10, Wireless LANs, from the book "Hacking for Dummies" written by Kevin Beaver.
 - 
			November 15, 2000
			
				15
				Nov'00
			
Wap usage: Planes, phones and automobiles
So your globe-trotting executives want to change their itineraries in mid-journey and need to check that their revised schedules still fit with corporate... 
