Skip to main content

Wireless

802.11n Wi-Fi to 'surpass wired Ethernet'

posted onMay 22, 2008
by hitbsecnews

Enterprise adoption of next-generation 802.11n Wi-Fi technology is " unprecedented", according to a new report, despite the standard being ratified only as a draft.

"Wi-Fi Certified 802.11n will eventually surpass wired Ethernet as the dominant enterprise Lan access technology," said Paul DeBeasi, senior analyst at the Burton Group, who prepared the report for the Wi-Fi Alliance.

Ten steps to wireless LAN security

posted onMay 21, 2008
by hitbsecnews

Wireless LANs (WLANs) are by nature hard to contain. Radio signals travel beyond customer premises in ways that are difficult to predict, and unwanted connections can easily escape notice. For these reasons, no WLAN should be installed without security. And yet, most wireless products arrive with security disabled. Value-added resellers (VARs) and integrators can add considerable value by activating built-in security and integrating third-party security to fill gaps. In this checklist, we describe 10 steps to accomplish these goals for wireless LAN security.

Wardrivers: Pioneers or Pirates?

posted onMay 16, 2008
by hitbsecnews

What initially attracted Lee Almodovar of Freemont, CA to wardriving was the possibility that he was breaking the law. He began wardriving in 2000, right out of high school, after discovering Walmart stocked inexpensive Wi-Fi cards.

Arstechnica guide to securing your wireless network

posted onMay 1, 2008
by hitbsecnews

Ars Technica's original Wireless Security Blackpaper was first published back in 2002, and in the intervening years, it has been a great reference for getting the technical lowdown on different wireless security protocols. As a sequel to the original blackpaper, we wanted to do something a little more basic and practical, because the number of devices with 802.11x support has greatly expanded since 2002.

WiFi keygen tool for BT Home Hubs released

posted onApril 25, 2008
by hitbsecnews

A security researcher claims to have found a significant weakness in the wireless encryption of a BT Home Hub DSL home gateway made by Thomson.

Exploiting the weakness could enable someone to connect to a victim's Wi-Fi router for malicious purposes such as snooping on their internet traffic or hacking other machines using the same network, according to GNUCitizen, a group of blogging security researchers.

BT's Home Hub ships with default encryption keys to encrypt wireless network traffic using either WEP (Wired Equivalent Privacy) or WPA (Wi-Fi Protected Access).

Majority of users leave their wireless networks exposed

posted onApril 24, 2008
by hitbsecnews

Nearly three-fifths (57 per cent) of UK businesses are leaving themselves vulnerable to hackers by not taking simple steps to protect their wireless networks, according to new research by managed security company, Network Box. The company investigated the protocols used by businesses to protect their wireless networks and found that 41 per cent use the largely-ineffective wired equivalent privacy (WEP) protocol; staggeringly, 16 per cent use no protection at all.

Turn Your Smartphone Into a Wi-Fi Hotspot

posted onMarch 26, 2008
by hitbsecnews

Waitasecond! I’m pretty selfish with my bandwidth. Why would I want to turn my wi-fi enabled smartphone into a hotspot? Well, maybe I would - because it’s generally easier to set up wi-fi than to set up a smartphone as a laptop modem.

Wednesday TapRoot Systems announced, for “immediate implementation into carrier networks,” WalkingHotSpot (WHS) client and server. The client will only work on WM and Symbian devices for now.

Bluetooth = Safe? Think again.

posted onMarch 25, 2008
by hitbsecnews

If you thought Bluetooth was relatively safe, think again. Telspace Systems will be joining the Hack-in-the-Box event in Dubai in April this year to talk about the technology's vulnerabilities.

How many times have you done a random Bluetooth device check in a theatre and turned up with at least a quarter of the total mobile phones around?

According to Dino Covotsos, managing director of South Africa based Telspace Systems people who are in the habit of having their Bluetooth options switched on all the time might literally be asking for trouble.

How to fine-tune your wireless network settings

posted onMarch 21, 2008
by hitbsecnews

Wireless connectivity is a wonderful invention, but it's not perfect. Not only are you still at risk from all the usual malware suspects when venturing online, your connection is also vulnerable to hackers. Here's how to secure access to your wireless network.

From The Labs: Clearwire WiMax

posted onMarch 16, 2008
by hitbsecnews

While it has yetto roll out a commercial WiMax network, Clearwire does offer broadband wireless services in 16 states based on Motorola (NYSE: MOT)'s proprietary OFDM-based Expedience technology. Clearwire recently launched service in Syracuse, N.Y., the home of our Syracuse University Real-World Labs, so we grabbed an opportunity to try out the network.