Wireless Security - Infoworld http://www.infoworld.com/t/2122 en The worst data breaches of 2014 ... so far http://www.infoworld.com/slideshow/148292/the-worst-data-breaches-of-2014-so-far-240315?source=rss_wireless_security <!--paging_filter-->We're only a third of the way through the year, and hackers have already had their way with all matter of security systems<div class="field field-type-text field-field-slideshow-dek"> <div class="field-label">Dek:&nbsp;</div> <div class="field-items"> <div class="field-item odd"> We&#039;re only a third of the way through the year, and hackers have already had their way with all matter of security systems </div> </div> </div> <div class="field field-type-text field-field-slideshow-external-source"> <div class="field-label">External Source:&nbsp;</div> <div class="field-items"> <div class="field-item odd"> networkworld.com </div> </div> </div> <div class="field field-type-text field-field-slideshow-url-redirect"> <div class="field-label">Redirect Unpublished Slideshow to:&nbsp;</div> <div class="field-items"> <div class="field-item odd"> http://www.networkworld.com/slideshow/147526 </div> </div> </div> Anti-spam Wireless Security Sat, 12 Apr 2014 10:00:00 +0000 admin 240315 at http://www.infoworld.com 6 lessons learned about the scariest security threats http://www.infoworld.com/d/security/6-lessons-learned-about-the-scariest-security-threats-236704?source=rss_wireless_security <div id="blog-edit" style="padding: 8px; background: none no-repeat scroll center top #ffffff; position: relative; float: right; width: 243px; height: 192px;"><img src="http://www.infoworld.com/sites/infoworld.com/files/media/image/lock_screen.jpg" alt="6 lessons learned about the scariest security threats" width="243" height="182" align="right" /><br /><em><p align="right">Credit: Naomi Anderson</p></em></div> Security IT Strategy Cyber Crime Data Security Hacking Malware Network Security Social Engineering Web Security Windows Security Wireless Security Security Mon, 24 Feb 2014 11:00:00 +0000 Jason Snyder 236704 at http://www.infoworld.com The weirdest, wackiest, and coolest sci/tech stories of 2013 http://www.infoworld.com/slideshow/133490/the-weirdest-wackiest-and-coolest-scitech-stories-of-2013-233007?source=rss_wireless_security <!--paging_filter-->From bathroom malware and the mystery Google barge to Chinese Moon landings and humanoid robots, it has been one crazy year in high-tech<div class="field field-type-text field-field-slideshow-dek"> <div class="field-label">Dek:&nbsp;</div> <div class="field-items"> <div class="field-item odd"> From bathroom malware and the mystery Google barge to Chinese Moon landings and humanoid robots, it has been one crazy year in high-tech </div> </div> </div> <div class="field field-type-text field-field-slideshow-external-source"> <div class="field-label">External Source:&nbsp;</div> <div class="field-items"> <div class="field-item odd"> networkworld.com </div> </div> </div> <div class="field field-type-text field-field-slideshow-url-redirect"> <div class="field-label">Redirect Unpublished Slideshow to:&nbsp;</div> <div class="field-items"> <div class="field-item odd"> http://www.infoworld.com/slideshow/133490 </div> </div> </div> Backup and Recovery Wireless Security Sat, 21 Dec 2013 11:00:00 +0000 admin 233007 at http://www.infoworld.com iOS apps vulnerable to Wi-Fi hijacking bug http://www.infoworld.com/t/wireless-security/ios-apps-vulnerable-wi-fi-hijacking-bug-229811?source=rss_wireless_security <div id="tw-edit" style="padding: 8px; background: none no-repeat scroll center top #ffffff; position: relative; float: right; width: 243px; height: 182px;"><img src="http://www.infoworld.com/sites/infoworld.com/files/media/image/apple_intruder_hp.jpg" alt="iOS apps vulnerable to Wi-Fi hijacking bug" width="243" height="182" align="right" /></div><p>Researchers from device security firm <a href="http://www.skycure.com/" target="_blank">Skycure</a> have unearthed an unnerving vulnerability in iOS that can be used to hijack a number of apps when used on an insecure Wi-Fi network. Mobile Technology Security Wi-Fi iOS Mobile Apps Mobile Security Smartphones Wireless Security Wed, 30 Oct 2013 11:14:00 +0000 InfoWorld Tech Watch 229811 at http://www.infoworld.com Wi-Fi security do's and don'ts http://www.infoworld.com/d/security/wi-fi-security-dos-and-donts-178861?source=rss_wireless_security <!--paging_filter--><div class="field field-type-text field-field-slideshow-dek"> <div class="field-label">Dek:&nbsp;</div> <div class="field-items"> <div class="field-item odd"> Protect your wireless networks by disregarding ineffectual technology and keeping an eye on points of entry </div> </div> </div> <div class="field field-type-nodereference field-field-slideshow-source"> <div class="field-label">Source:&nbsp;</div> <div class="field-items"> <div class="field-item odd"> <a href="/%5Bprimary-term-alias-prefix%5D/%5Bprimary-term%5D/network-world-044">Network World</a> </div> </div> </div> <div class="field field-type-number-integer field-field-essentials"> <div class="field-items"> <div class="field-item odd"> No </div> </div> </div> Security Wireless Security Mon, 14 Nov 2011 11:00:00 +0000 Pete Babb 178861 at http://www.infoworld.com Google's Wi-Fi sniffing should be the least of our worries http://www.infoworld.com/t/wireless-security/googles-wi-fi-sniffing-should-be-the-least-our-worries-939?source=rss_wireless_security <div style="padding: 8px; background: none no-repeat scroll center top #ffffff; position: relative; float: right; width: 243px; height: 182px;"><img src="http://www.infoworld.com/sites/infoworld.com/files/media/image/Google_Mobile_hp.jpg" alt="Google's Wi-Fi sniffing should be the least of our worries" width="243" height="182" align="right" /></div><p>Add Connecticut Attorney General Richard Blumenthal to the list of politicians out there who are shocked -- shocked!</p> Networking Security Google Wireless Security Mon, 21 Jun 2010 21:01:54 +0000 InfoWorld Tech Watch 127939 at http://www.infoworld.com McAfee builds SaaS arm http://www.infoworld.com/d/security-central/mcafee-builds-saas-arm-662?source=rss_wireless_security <div class="rxbodyfield"><p page="1" class="ArticleBody">McAfee on Monday announced that it has rolled its SaaS security offerings into a new business unit.</p> <p page="1" class="ArticleBody">The new unit will include all McAfee products delivered over the Internet,&#160;including security scanning, Web and e-mail security, and remote managed host-based software and hardware.</p></div> Networking Security Compliance Anti-spyware Anti-virus Risk Management Wireless LAN Malware Phishing Social Engineering Wireless Security Networking Security Technology Business Mon, 02 Feb 2009 18:48:00 +0000 admin 2662 at http://www.infoworld.com New paint promises high-speed Wi-Fi shielding http://www.infoworld.com/d/networking/new-paint-promises-high-speed-wi-fi-shielding-369?source=rss_wireless_security <div class="rxbodyfield"><p page="1" class="ArticleBody">IT managers should start familiarising themselves with a new security tool, the paint brush, as Japanese researchers have come up with a paint that they say will block high-speed wireless signals, giving businesses a cheap option to protect their wireless networks.</p></div> Networking Security Wireless LAN Wireless Security Networking Security Wed, 21 Jan 2009 15:47:30 +0000 admin 2369 at http://www.infoworld.com Once thought safe, WPA Wi-Fi encryption is cracked http://www.infoworld.com/d/security-central/once-thought-safe-wpa-wi-fi-encryption-cracked-635?source=rss_wireless_security <div class="rxbodyfield"><p page="1" class="ArticleBody">Security researchers say they&#39;ve developed a way to partially crack the Wi-Fi Protected Access (WPA) encryption standard used to protect data on many wireless networks.</p></div> Networking Security Internet Data Security Wireless LAN Malware Wireless Security Data Management Networking Operating Systems Security Thu, 06 Nov 2008 12:57:16 +0000 admin 39635 at http://www.infoworld.com RFID passport cards vulnerable to snooping http://www.infoworld.com/d/security-central/rfid-passport-cards-vulnerable-snooping-106?source=rss_wireless_security <div class="rxbodyfield"><p page="1" class="ArticleBody">RFID tags used in two new types of border-crossing documents in the U.S. are vulnerable to snooping and copying, a researcher said on Thursday.</p></div> Networking Security Access Control Network Monitoring Internet Privacy Wireless LAN Wireless Security Data Management Networking Security Fri, 24 Oct 2008 10:54:18 +0000 admin 39106 at http://www.infoworld.com Terry Childs: Admin gone rogue http://www.infoworld.com/t/security/terry-childs-admin-gone-rogue-708?source=rss_wireless_security <!--paging_filter--><div class="field field-type-text field-field-special-report-dek"> <div class="field-items"> <div class="field-item odd"> The missteps and misunderstandings in the curious case of Terry Childs, network kidnapper, has the IT world riveted -- and InfoWorld blogger Paul Venezia determined to get the real facts behind the media circus and nonsensicial technical claims </div> </div> </div> <div class="field field-type-text field-field-spec-rept-intro"> <div class="field-items"> <div class="field-item odd"> The missteps and misunderstandings in the curious case of Terry Childs, network kidnapper, has the IT world riveted -- and InfoWorld blogger Paul Venezia determined to get the real facts behind the media circus and nonsensicial technical claims </div> </div> </div> <div class="field field-type-number-integer field-field-essentials"> <div class="field-items"> <div class="field-item odd"> No </div> </div> </div> <div class="field field-type-nodereference field-field-spec-rept-related-nodes"> <div class="field-label">Special Report Items:&nbsp;</div> <div class="field-items"> <div class="field-item odd"> <a href="/d/data-management/childs-attempt-protect-network-password-gone-awry-978">Childs&#039; attempt to protect the network password gone awry?</a> </div> <div class="field-item even"> <a href="/d/data-management/could-childs-case-put-all-network-admins-in-danger-979">Could the Childs case put all network admins in danger?</a> </div> <div class="field-item odd"> <a href="/d/data-management/laid-it-workers-terry-childs-and-unexpected-consequences-976">Laid-off IT workers, Terry Childs, and unexpected consequences</a> </div> <div class="field-item even"> <a href="/d/data-management/terry-childs-case-in-its-own-words-928">The Terry Childs case in its own words</a> </div> <div class="field-item odd"> <a href="/d/data-management/terry-childs-case-cacophony-927">The Terry Childs case cacophony</a> </div> <div class="field-item even"> <a href="/d/adventures-in-it/why-san-franciscos-network-admin-went-rogue-286">Why San Francisco&#039;s network admin went rogue</a> </div> <div class="field-item odd"> <a href="/d/security-central/update-san-francisco-da-discloses-citys-network-passwords-495">Update: San Francisco DA discloses city&#039;s network passwords</a> </div> <div class="field-item even"> <a href="/d/security-central/parts-san-francisco-network-still-locked-out-190">Parts of San Francisco network still locked out</a> </div> <div class="field-item odd"> <a href="/d/hardware/terry-childs-state-case-355">Terry Childs: State of the case</a> </div> <div class="field-item even"> <a href="/d/security-central/san-franciscos-mayor-gets-back-keys-network-370">San Francisco&#039;s mayor gets back keys to the network</a> </div> <div class="field-item odd"> <a href="/d/data-management/terry-childs-jailhouse-interview-977">Terry Childs: The jailhouse interview</a> </div> <div class="field-item even"> <a href="/d/security-central/update-it-administrator-pleads-not-guilty-network-tampering-220">Update: IT administrator pleads not guilty to network tampering</a> </div> <div class="field-item odd"> <a href="/d/security-central/san-francisco-hunts-mystery-device-city-network-763">San Francisco hunts for mystery device on city network</a> </div> <div class="field-item even"> <a href="/d/data-management/childs-motion-reduced-bail-has-been-denied-917">Childs&#039; motion for reduced bail has been denied</a> </div> <div class="field-item odd"> <a href="/d/data-management/sorting-out-fact-fiction-in-terry-childs-case-310">Sorting out fact from fiction in the Terry Childs case</a> </div> </div> </div> <div class="field field-type-media-nodereference field-field-spec-rept-teaser-lg-mm"> <div class="field-items"> <div class="field-item odd"> <a href="/node/71484">Terry Childs HP</a> </div> </div> </div> Data Security Wireless LAN Wireless Security Data Management Networking Security Fri, 25 Jul 2008 21:59:48 +0000 admin 52708 at http://www.infoworld.com IPhones present Wi-Fi risk to businesses http://www.infoworld.com/d/security-central/iphones-present-wi-fi-risk-businesses-389?source=rss_wireless_security <div class="rxbodyfield"><p page="1" class="ArticleBody">IPhones are creating an increased security threat to businesses, especially when used with Wi-Fi networks, an Australian expert has warned.</p> <p page="1" class="ArticleBody">Chris Gatford, senior security consultant at Pure Hacking, highlighted that the adoption by businesses of the iPhone will &quot;elevate risk to a level never seen before.&quot;</p></div> Networking Security Application Development Wireless LAN Wireless Security Computer Hardware Networking Security Fri, 13 Jun 2008 15:26:45 +0000 admin 36389 at http://www.infoworld.com Stupid hacker tricks, part two: The folly of youth http://www.infoworld.com/d/security-central/stupid-hacker-tricks-part-two-folly-youth-006?source=rss_wireless_security <div class="rxbodyfield"><p class="ArticleBody" page="1">Ah, youth. Ready to take on the world, today's generation of dynamic, tech-immersed youngsters have grown up alongside the Internet. Firsthand, and sometimes single-handedly, they have advanced some of today's hottest technology trends, from peer-to-peer networking, to massively multiplayer online games, to social networks and instant messaging. And along the way, a small, sociopathic number of them have behaved very, very badly.</p></div> Networking Security Authentication Data Loss Prevention Data Security Wireless LAN Malware Security Management Social Engineering Vulnerability Assessment Wireless Security Data Management Networking Security Mon, 05 May 2008 10:00:00 +0000 admin 35006 at http://www.infoworld.com Ethical hacker group to counter 'black PR' http://www.infoworld.com/d/security-central/ethical-hacker-group-counter-black-pr-645?source=rss_wireless_security <div class="rxbodyfield"><p page="1" class="ArticleBody">A self-styled ethical hacker group plans to counter moves by companies that attempt to bury security vulnerability information in order to protect their businesses.</p></div> Networking Security Compliance Anti-spyware Anti-virus Risk Management Wireless LAN Malware Phishing Social Engineering Wireless Security Networking Security Technology Business Thu, 27 Mar 2008 14:59:03 +0000 admin 33645 at http://www.infoworld.com Professor: Computers plus people equals risk http://www.infoworld.com/d/security-central/professor-computers-plus-people-equals-risk-641?source=rss_wireless_security <div class="rxbodyfield"><p class="ArticleBody" page="1">Companies are relying too much on technology to run their businesses, a trend that doesn&#39;t account for unpredictable situations that humans still deal with better than machines, a technology expert said Thursday.</p></div> Networking Security Compliance Anti-spyware Anti-virus Risk Management Wireless LAN Malware Phishing Social Engineering Wireless Security Networking Security Technology Business Thu, 27 Mar 2008 14:43:40 +0000 admin 33641 at http://www.infoworld.com E-scammers trashing reputations http://www.infoworld.com/t/business/e-scammers-trashing-reputations-685?source=rss_wireless_security <div class="rxbodyfield"><p class="ArticleBody" page="1">Phishers, cyber-squatters, and other online fraudsters continued their assault on well-known corporate brands over the last 12 months, increasing the burden on the companies being targeted and further frustrating consumers.</p></div> Networking Anti-spam Authentication Data Loss Prevention Risk Management Data Security Endpoint Protection Systems Management Identity Management Internet Privacy Wireless LAN Malware Applications Security Management Social Engineering Wireless Security Data Management Networking Security Technology Business Mon, 25 Feb 2008 19:50:32 +0000 admin 32685 at http://www.infoworld.com Remote worker security still lax http://www.infoworld.com/d/security-central/remote-worker-security-still-lax-144?source=rss_wireless_security <div class="rxbodyfield"><p class="ArticleBody" page="1">Despite having a greater awareness of the security risks posed by careless computing habits and personal Internet activity carried out on corporate laptops, many remote workers continue to do things that imperil the safety of themselves and their employers, according to a new report from Cisco.</p></div> Networking Security Compliance Internet Anti-spam Application Development Data Loss Prevention Risk Management Data Security Endpoint Protection Wireless LAN Malware Applications Security Management Security Standards Social Engineering VPN Wireless Security Data Management Networking Operating Systems Security Technology Business Tue, 05 Feb 2008 23:25:17 +0000 admin 32144 at http://www.infoworld.com Apple growth will draw malware attacks http://www.infoworld.com/d/security-central/apple-growth-will-draw-malware-attacks-674?source=rss_wireless_security <div class="rxbodyfield"><p class="ArticleBody" page="1">As Apple continues to grow its worldwide market share and the company's products find their way into more business environments, attackers are certain to follow and create greater volumes of exploits aimed at vulnerabilities in the company's software, security experts contend.</p></div> Networking Security Internet Application Development Data Loss Prevention Risk Management Data Security Endpoint Protection Systems Management Internet Privacy Wireless LAN Malware Applications Patch Management Security Management Security Standards Social Engineering Vulnerability Assessment Wireless Security Data Management Networking Operating Systems Security Technology Business Mon, 21 Jan 2008 11:00:00 +0000 admin 31674 at http://www.infoworld.com IBM digs into security management http://www.infoworld.com/d/security-central/ibm-digs-security-management-358?source=rss_wireless_security <div class="rxbodyfield"><p class="ArticleBody" page="1">IBM is aggressively expanding its security portfolio in hopes of becoming the de facto source of advice and technology for businesses looking to adopt high-level IT governance and risk management strategies -- a transformation among customers that officials at Big Blue cite as both ongoing and inevitable.</p></div> Networking Security Compliance Internet DRM Application Development Service-oriented Architecture Data Loss Prevention Risk Management Data Security Endpoint Protection Firewall Systems Management Identity Management Internet Privacy Wireless LAN Intrusion Detection Malware Applications Patch Management Security Management Security Standards Social Engineering VPN Vulnerability Assessment Wireless Security Data Management Networking Operating Systems Security Technology Business Mon, 07 Jan 2008 22:42:17 +0000 admin 31358 at http://www.infoworld.com Wi-Fi virus outbreak is possible, researchers say http://www.infoworld.com/d/networking/wi-fi-virus-outbreak-possible-researchers-say-272?source=rss_wireless_security <div class="rxbodyfield"><p page="1" class="ArticleBody">If criminals were to target unsecured wireless routers, they could create an attack that could piggyback across thousands of Wi-Fi networks in urban areas like Chicago or New York City, according to researchers at Indiana University.</p> <p page="1" class="ArticleBody">The researchers estimate that a Wi-Fi attack could take over 20,000 wireless routers in New York City within a two-week period, with most of the infections occurring within the first day.</p></div> Networking Security Wireless LAN Malware Wireless Security Networking Security Fri, 04 Jan 2008 11:57:16 +0000 admin 31272 at http://www.infoworld.com