11 tips for protecting your wireless networks
11 tips for protecting your wireless networks
Phreaking is a term not often used these days. It was introduced to describe the technique of simulating telephone tones to fool a phone system into giving you free calls.
So although IPSec is a mandatory part of IPv6, it's not mandatory to use it. It's nice to have seat belts, and having seat belts built in does make it more likely people will use them.
Do <a href="http://www.networkworld.com/topics/security.html">security</a> vendors secretly create the attacks their tools are designed to ward off? Of course not, but that old chestnut hints at a broader suspicion about whether the current state of security is really as bad as the security firms make it out to be, especially when it comes to the latest poster child: advanced persistent threats.
Wi-Fi is inherently susceptible to hacking and eavesdropping, but it can be secure if you use the right <a href="http://www.networkworld.com/topics/security.html">security</a> measures. Unfortunately, the Web is full of outdated advice and myths. But here are some do's and don'ts of Wi-Fi security, addressing some of these myths.
Hacker collective Anonymous and the drug cartel Los Zetas had a showdown, and the cartel blinked.
Adidas has taken down numerous of its websites after suffering a "sophisticated, criminal cyberattack".
I recently read an article in ZDNet Asia that reported that approximately 67% of Singapore organizations had experience a cyber attack in the last 12 months. Further, 95% of those that were attacked experienced some form of financial impact from the attacks. While I cannot comment on the results of the study directly, the results are not unexpected.
Ever been in an argumentative mood? Well, last week we were, with editors here coming up with 33 red-hot arguments, such as open source vs. proprietary, or which browser is better.
<a href="http://www.networkworld.com/subnets/microsoft/">Microsoft</a> has released a Fix-it tool to allow <a href="http://www.networkworld.com/topics/windows.html">Windows</a> users to manually patch their systems to thwart the Duqu Trojan: <a href="http://technet.microsoft.com/en-us/security/advisory/2639658">Microsoft Security Advisory (2639658)</a>.
As tablets and smartphones are entering the workplace en masse, we <a href="http://www.pcworld.com/businesscenter/article/242869/quick_poll_where_do_you_stand_on_mobile_devices.html">polled business managers and IT managers</a> on how they're handling the bring-your-own-device (BYOD) trend.
Mozilla has revoked its trust for a Malaysian certificate authority that issued 22 Secure Sockets Layer certificates with 'weak keys', potentially making them available to spoof a legitimate website.
Microsoft on October 25 added the Poison Ivy remote access tool (RAT) to its automated malicious software removal tool for Windows machines, reflecting heightened concerns over a malware kit that has been around since 2005.
People are accessing the internet (and their own corporate services) in changing ways, increasingly through a single mobile device. Focus is increasingly placed on smartphones to stay up-to-date socially and professionally, and the blurring of these roles poses new security challenges for all businesses.
With all the publicity about breaches of <a href="http://www.networkworld.com/news/2011/081811-ssl-249874.html">SSL certificate authorities</a> and a hack that exploits a vulnerability in the supposedly secure protocol, it's time to consider something else to protect Internet transactions. If only there were something else to turn to.
First there were sewing-machine sized portable PCs, then laptops, the Newton, the Palm Pilot, and phones with built-in PDA functions. The iPhone led the way to the ubiquitous smartphone, and the iPad ushered in an era of tablets. Now wireless hotspots, printers, storage, and a variety of other devices are making their way onto your office network, possibly without the knowledge of managers.
WikiLeaks founder Julian Assange lost an appeal in the U.K.'s High Court on Wednesday that sought to block his extradition to Sweden on potential charges of rape and molestation.
Whether you celebrated National Identity Fraud Awareness Week (NIFAW) with a large identity cake or just shrieked 'Who Are You?' and other identity-inspired songs with friends over a beer or four, the campaign has run its course for another year -– and reminded those who were listening that we're still living in a world of trusting, naïve fools.
Facebook has apparently fixed a vulnerability in its social-networking site after insisting it wasn't a weakness and didn't need to be remedied.
Two Ukrainian nationals who had used a banking Trojan to siphon funds from an unknown number of UK targets were on Monday sentenced to four years and eight months imprisonment.