Filtered by: Wi-fi-security

What’s Government’s Role In Protecting Wireless Networks?

Both private businesses and governmental agencies are increasingly concerned about the mounting threats to wireless devices and networks. However, government approaches to dealing with the problem vary dramatically. From India, through the United States to the United Kingdom steps have taken range from full blown bans on use of wireless devices in the government workplace (…)

Dror Liwer, April 6, 2017

How Good Wireless Visibility Can Beat the Rogue Access Points

With wireless security, it’s all about visibility. Look around a coffee shop, airport, or even an office building and it’s impossible to miss all the smartphones, tablets and laptop computers. Just about everyone has a wireless device. But the downside to all these devices – and thus the downside to BYOD also – is a (…)

Dror Liwer, January 26, 2017

Confining the Enterprise Wi-Fi Cyber Mess

When companies develop Wi-Fi policies, they factor from the outset that everyone from the top executives down to the newest intern will need internet access in all places and all times, even in-flight. Furthermore, if Wi-Fi is for some reason inaccessible, all smartphones have hotspot options, meaning that Wi-Fi surrounds us like the air we (…)

Dror Liwer, December 11, 2016

The End for SMS-Based Two Factor Authentication

For home users and enterprise professionals alike, SMS-based two-factor authentication (2FA) has become a relatively annoying fact of life. Type your password into your computer, wait while a text is sent to your phone, and then race to type in a second passcode before it expires. It’s a bit of a hassle, but for many (…)

Dror Liwer, October 5, 2016

Top 6 Places Your Mobile Device Is Most At Risk of Being Hacked

In 2016, connectivity seems less like a technological feature and more like a birthright. Though limitless WiFi and 4G/LTE may seem like nirvana, it also means hackers have nearly limitless opportunities to take control of your mobile device. While connectivity is a passport to the digital world, it is also a hacker’s gateway to sensitive (…)

Dror Liwer, August 1, 2016

Commjacking From the Least Likely Places: Door Bells, Drones and Robin Hood

As we’ve highlighted (more than once…..) before in this blog space, a commjacker needs only WiFi access and some basic tools to gain access to your wireless device. Whether you’re in a café, on an airplane, in a car or at home, if a commjacker has the means, s/he has a way into your device (…)

Dror Liwer, July 4, 2016
Load More
Powered by WishList Member - Membership Software