Sunbelt BLOG: WarXing It’s interesting to see a legal opinion on the items relating to wireless networking.. the opinion seems to be “don’t connect to someone else’s wireless and if you do don’t download a lot of traffic” My (and IANAL) opinion is that this line of thinking applies if the person is aware that […]
TomsNetworking Product Reviews : TomsNetworking : Review of a very interesting product from Airmagnet. I’ve used their laptop analyser product, which is great for Wireless Security Site Surveys, but the spectrum analyser is more focused on the performance site survey side of things. V.cool to be able to track down all the sources of interference […]
Mobilised com au – BETTER WIRELESS SECURITY This announcement from Intel and Cisco could be good for wireless networking security, although at the moment it does seem a touch light on detail. Of course the worry I’d have with this kind of partnership is that the parties might choose to keep their enhancements proprietary, which […]
SC Magazine I was looking for some wireless security articles this morning and came across this one which appears to be saying that wireless networks are fundamentally insecure and therefore the answer is to run VPN’s over them…. Now this might have been the only answer before 802.11i was agreed and issued, but nowadays I’d […]
Bluetooth adverts spark virus fears – vnunet.com Story discussing a new advertising technique whereby content is transmitted directly to bluetooth phones, and pointing out the risks of getting users in the habit of accepting content beamed to them. The comments from the company making the advertising mechanism are interesting. They seem to be saying it’s […]
BBC NEWS | Technology | Tracking a suspect by mobile phone A decent description of the ease with which people can be tracked, based on their mobile phones. In this case used to track down a terrorist suspect. Also describes potential methods of phone tapping used by the police.
Schneier on Security: Attack on the Bluetooth Pairing Process Here’s a note from Bruce Schneier on an interesting new attack on the bluetooth protocol (or more accurately common implementations of the protocol)… Following this, if there are tools released which implement the attack, it’ll really reduce where bluetooth should be used in corporate settings… all […]