“If you build it, they will come.” This popular adage from the 1989 classic, Field of Dreams, remains relevant today across a variety of industries – including wireless technology. For example, if you create a new communication medium for transmitting information and sensitive data over the air, groups of skilled experts will quickly form to explore the new channel for … [Read more...]
Search Results for: wireless
WatchGuard Earns Five Golden Bridge Awards, Securing Gold for Network Firewall and Wireless Security Innovation
WatchGuard has been recognized with five awards from the 2017 Golden Bridge Awards Program. The annual awards encompass the world’s best in organizational performance, innovations, products and services, executives and management teams, women in business, customer satisfaction programs and more, across every major industry category worldwide. Here’s the full list of product … [Read more...]
Hacking Door Locks and Car Locks (Or Anything Wireless)
When a wireless device of any kind sends data from one location to another, the device needs to protect the data just as if it was traveling over a wired network. Unfortunately, that is often not the case as several security researchers proved at Black Hat and Def Con. Tools exist that allowed the researchers to capture data traveling over different types of wireless protocols … [Read more...]
Wireless 802.11 Car Hack – Daily Security Byte EP. 268
Connecting cars to the Internet through GSM cellular networks already proved dangerous, but what if you built a wireless access point into your car? Watch today's video to learn how car thieves might exploit the latest car hacking research. (Episode Runtime: 3:44) Direct YouTube Link: https://www.youtube.com/watch?v=UBSGDeoFykw EPISODE REFERENCES: Reseachers hack … [Read more...]
WatchGuard Security Prediction #9 – Spies Slip Into Wireless Alliances
To be honest, wireless security hasn’t changed too much in the last few years. That’s not to say it’s perfectly secure. There are still plenty of folks using legacy WEP encryption standards, and organizations that use WPA2-PSK with a horrible password. There are also many wireless networks that don’t segment clients, so attackers can sniff plenty of private connections by … [Read more...]