11 tips for protecting your wireless networks
11 tips for protecting your wireless networks
Wi-Fi is inherently susceptible to hacking and eavesdropping, but it can be secure if you use the right <a href="http://www.networkworld.com/topics/security.html">security</a> measures. Unfortunately, the Web is full of outdated advice and myths. But here are some do's and don'ts of Wi-Fi security, addressing some of these myths.
As tablets and smartphones are entering the workplace en masse, we <a href="http://www.pcworld.com/businesscenter/article/242869/quick_poll_where_do_you_stand_on_mobile_devices.html">polled business managers and IT managers</a> on how they're handling the bring-your-own-device (BYOD) trend.
People are accessing the internet (and their own corporate services) in changing ways, increasingly through a single mobile device. Focus is increasingly placed on smartphones to stay up-to-date socially and professionally, and the blurring of these roles poses new security challenges for all businesses.
First there were sewing-machine sized portable PCs, then laptops, the Newton, the Palm Pilot, and phones with built-in PDA functions. The iPhone led the way to the ubiquitous smartphone, and the iPad ushered in an era of tablets. Now wireless hotspots, printers, storage, and a variety of other devices are making their way onto your office network, possibly without the knowledge of managers.
Juniper Networks' suite of mobile security and device management tools is coming to three Samsung Electronics devices, marking the first time the company has provided its SSL VPN software for Google's Android OS.
ISACA Sydney presented the 4th annual One Day Summit on Tuesday October 25, 2011 at the Hilton Hotel in Sydney. This year, the theme was "Technology on the Move" which focussed on mobility and cloud computing as well as IT governance, change management, risk management and Advanced Persistent Threats. Following the keynote presentation and individual speakers, a panel was held to broaden the discussion.
A new variant of the DroidKungFu Android Trojan is posing as a legitimate application update in order to infect handsets, according to security researchers from Finnish antivirus vendor F-Secure.
Hackers have released a denial of service (DoS) tool that purportedly allows one computer on a standard DSL connection to knock out a web server on a 30 Gigabit link.
As more business smartphone users demand remote access to corporate documents, organisations need to be wary of what app makers mean when they claim their apps are “business class”.
McAfee's Focus 11 conference — like every vendor's conference — isn't really about the open sharing of detailed technical information. That takes place at events like AusCERT or Black Hat. It's about preparing soil for the seeds of marketing.
The default settings for Apple’s new iPhone 4S personal assistant Siri allows anyone to give it commands when it’s password-locked.
On one wall of McAfee's expensive-looking executive briefing centre in Santa Clara, California, a live feed from the company's Global Threat Intelligence system displays the names of malware variants as they're detected in real time -- red LEDs on shiny black acrylic.
Lookout, the company behind the most popular Android antivirus software, has released its first product for iOS iPhone and iPad devices.
Security managers must break down their walled-garden mentalities and integrate security deep into the heart of increasingly flexible, BYO computing-driven IT service management (ITSM) environments or risk data death by a thousand cuts, a systems and security consultant has warned.
A 26 year-old German man has been sentenced to three years imprisonment for rigging retail card payment consoles to transmit captured card details and PINs over Bluetooth.
Confidentiality, integrity and availability are oft-mentioned goals of <a href="http://www.networkworld.com/topics/security.html">security</a>, and that being the case, this week's <a href="http://www.networkworld.com/news/2011/101311-blackberry-restored-251941.html">lack of service globally for the BlackBerry</a> constitutes a profound security collapse.
Even apart from the serious security flaw in HTC Sense and malware that talks to an encrypted blog, to name just two recent issues, a consensus seems to be emerging. Android has serious security problems.
The SSL certificate authorities like <a href="http://www.networkworld.com/news/2011/090611-comodo-hacker-claims-credit-for-250454.html">Comodo</a> that have had their security undermined by hackers shouldn't be trusted, and in fact, the way the entire <a href="http://www.networkworld.com/news/2011/091911-clarke-cybersecurity-251014.htm">SSL certificate industry of today</a> works can and should be replaced with something better, says <a href="http://en.wikipedia.org/wiki/Moxie_Marlinspike">Moxie Marlinspike</a>, a security expert who's come up with a plan he says will do that.
If you use your Android smartphone for both business and pleasure, a product introduced today at a trade show in Germany appears to be worth following. A version of Android called BizzTrust creates two partitions in Android--one for personal use and another super-secure one for business.