The insecure wireless network at a Marshalls discount clothing store near St. Paul, Minn. may have allowed hi-tech attackers to gain a beachhead in retail giant TJX Companies' computer network, resulting in the theft of information on at least 45.6 million credit and debit cards, the Wall Street Journal reported on Friday.securityfocus.com
by Kramer 05:54PM Friday Jan 19 2007
by Raul Siles
This two-part series looks at the issues associated with collecting and analyzing network traffic from wireless networks in an accurate and comprehensive way; a discipline known as wireless forensics.
more at securityfocus.com
by Cudni 06:11PM Wednesday Oct 04 2006
by David Maynor
This article is designed as a beginner's guide to fuzzing wireless device drivers. To get the most out of it you should already be familiar with exploit development and debugging, as the article does not cover either of those topics in depth.
more at securityfocus.com
by Cudni 04:11PM Tuesday May 02 2006
By Andrew R. Hickey story continues..
Those were the first words out of Ned Allison's mouth one recent afternoon when by chance he spotted a crasher trying to hop onto his network.
by Cudni 12:20PM Thursday Feb 09 2006
Scott Granneman story continues..
The average user has no idea of the risks associated with public WiFi hotspots. Here are some very simple tips for them to keep their network access secure.
by Cudni 08:10AM Wednesday Aug 17 2005
This new tool is called The Car Whisperer and allows people equipped with a Linux Laptop and a directional antenna to inject audio to, and record audio from bypassing cars that have an unconnected Bluetooth hands free unit running. Since many manufacturers use a standard passkey which often is the only authentication that is needed to connect. story continues..
by AVD 08:58AM Wednesday Jun 22 2005
ATLANTA, Georgia (CNN) -- What comes to mind when you think of wireless Web surfing? It may not be security, or lack of it. There are nearly 30,000 public wireless "hot spots" in the United States at places such as parks and cafes, but there's more to consider than just where to log on. The convenience comes with a caveat...Click for More
by Cudni 01:25PM Wednesday Jun 08 2005
After demonstrating in How To Crack WEP – Part 1 and Part 2 that WEP cracking is easier than you may have thought, I will now switch gears. In this last part of the WEP Crack How To, I will show you how to take a common sense approach to protecting your wireless network. story continues..
by Cudni 07:03PM Wednesday Apr 27 2005
By Dan Ilett
Wireless hackers in the United Kingdom could soon face a new obstacle to stealing information.
The British government has endorsed a transparent film that can block Wi-Fi transmissions and other wireless signals from traveling through windows.
The film, called SpyGuard, can be laminated or fitted inside windows to prevent remote eavesdroppers from penetrating rooms with infrared or Wi-Fi signals to steal information or access private networks.
more at news.com
by Cudni 06:59PM Wednesday Apr 27 2005
Silicon.com is reporting of rather interesting hacker attack that happened on WLAN IT conference in London on previous week.
Apparently the hackers created malicious WLAN hotspots with forged log-in web page, that tries to install malware on users computer that logs to the hotspot and tries to access web over it.
While technically this kind of attack is rather simple to accomplish, it raises worrying implications on use of free wireless hotspots. As business travellers frequently use whatever connection is available, and carry quite important data in their laptops.
more at f-secure.com
by Cudni 05:49PM Saturday Apr 23 2005
It's claimed that hotspot usage is up markedly in the past six months, and attackers are following the crowds, especially at airline hubs, where business travelers congregate, sending and receiving valuable business information. Starbucks gets much less attention.
Read more: Securitypipeline
by Cudni 06:47PM Thursday Apr 21 2005
Citing the increased risk posed by mobile workers and wireless networking technology, Microsoft and VeriSign said they are teaming up to help organizations secure Wi-Fi networks. The two will collaborate to create a Wi-Fi security architecture based on Microsoft's Network Access Protection and VeriSign's Unified Authentication platforms.
More at eweek.com
by Cudni 06:25PM Thursday Apr 21 2005
By John Leyden
You've heard of war driving and phishing but now there's yet another reason to wear a tin-foil hat every time you surf the net. "WiPhishing" (pronounced why phishing) involves covertly setting up a wireless enabled laptop or access point in order to get wireless-enabled laptops to associate with it as a prelude to hacking attacks.
An estimated one in five access points use default SSIDs (such as linksys). By guessing the name of a network that target machines are normally configured to connect to a hacker could (at least in theory) gain access to data on a laptop or introduce malicious code.
more at Security Focus
by Cudni 08:03AM Thursday Apr 21 2005
by Matt Loney
Companies are finding themselves forced to roll out Wi-Fi to solve problems caused by frustrated employees who are doing it themselves, anecdotal evidence suggests.
Employees are creating security holes in their corporate networks by setting up their own WiFi hot spots under their desks, senior executives warned on Wednesday.
Speaking at the Wireless LAN conference in London, Anurag Lal, vice-president of business development at iPass, said that Wi-FI has become a double-edged sword for many companies. Lal gave the example of a large Boston-based financial institution who resisted iPass's initial approach. "They resisted us for a long time," said Lal, "saying 'we don't believe in Wi-Fi so we are not deploying Wi-Fi', then six months later we got a call from the head of IT who said 'come in we need your help'"
more at ZDNET News
by Cudni 03:42PM Tuesday Apr 05 2005
At a recent ISSA (Information Systems Security Association) meeting in Los Angeles, a team of FBI agents demonstrated current WEP-cracking techniques and broke a 128 bit WEP key in about three minutes. Special Agent Geoff Bickers ran the Powerpoint presentation and explained the attack, while the other agents (who did not want to be named or photographed) did the dirty work of sniffing wireless traffic and breaking the WEP keys. This article will be a general overview of the procedures used by the FBI teamMore at Slashdot
by drake 02:34AM Friday Mar 25 2005
By Elena Malykhina story continues..
Monday's second annual "Wireless On Wall Street" summit in New York gathered a diverse crowd of business and technology professionals from banks, brokerages, and insurance companies of all sizes. Yet they all shared a common goal: secure and uncomplicated deployment of wireless technologies.
by drake 11:28PM Wednesday Mar 02 2005 By Florence Olsen, Federal Computer Week
Wireless networks are inherently insecure, but the more layers of security they have, the less likely they are to be attacked, said Mischel Kwon, wireless security officer for the Justice Department's Management Division.
Speaking today at the Wireless/RFID Conference and Exhibition in Washington, D.C., Kwon said the most secure layered approached would use the latest wireless grid technologies in combination with wireless intrusion-detection systems.Story Continues @ usatoday.com
by Cudni 11:02AM Sunday Feb 20 2005
by Will Knight
Wireless computer networks could be secured against fraud and identity theft using a novel cryptographic protocol designed to keep passwords safe from prying eyes.
Markus Jakobsson and Steve Myers of Indiana University, US, demonstrated the new security scheme, dubbed "delayed password disclosure", at the American Association for the Advancement of Science meeting in Washington DC on Saturday.
more at Newscientist.com
by drake 11:20PM Tuesday Feb 15 2005
SAN FRANCISCO -- Zone Labs®, a Check Point® company, today announced the immediate availability of ZoneAlarm® Wireless Security, a new Internet security solution designed specifically for mobile users and wireless home networks. ZoneAlarm Wireless Security combines the Zone Labs award-winning firewall with essential wireless network security and email protection to automatically detect and protect both wireless and wired network connections. story continues..
by drake 10:14PM Saturday Jan 22 2005
LONDON - Wireless networks giving computer users internet access from anywhere in the home could expose them to eavesdropping and programmers should make their security software easier to use, researchers say.
"WiFi networks leave home computer users open to unprecedented levels of security breaches," New Scientist magazine said on Wednesday.
Most wireless networks come with security features to prevent snoopers reading emails and other documents, but many people do not use them because they are difficult to implement. Story Continues ...