Security Corner:

Mobile

1

November 8, 2010  2:56 PM

A Simple Trick to Make Public WiFi Encryption Easy to Implement



Posted by: Ken Harthun
Firesheep, Security, wifi, WPA

With the Firesheep firestorm (there are over 1,000,000 search results as of this writing) blazing across the web, there is a lot of pressure on cafes, coffee shops and other establishments that offer free open WiFi to implement WPA2 encryption. While it's trivial to set it up, fielding the...

November 5, 2010  3:31 AM

Baa Baa, Firesheep, Have You Any Wool?



Posted by: Ken Harthun
Encryption, Firesheep, Hacking, Security, SSL, wifi, WPA

Bookmark and Share     0 Comments     RSS Feed     Email a friend


December 13, 2009  11:25 PM

Golden Rule #13: WiFi Security–The Only Way is WPA



Posted by: Ken Harthun
14 Golden Rules of Computer Security, Security, Security practice, Wireless security, WPA

Bookmark and Share     1 Comment     RSS Feed     Email a friend


November 14, 2008  3:00 AM

WPA-TKIP Now Vulnerable to Attack



Posted by: Ken Harthun
Secure Computing, Security, Security management, Wireless, Wireless security, WPA

In my How to Secure Your Computer series of articles, I issued Maxim #13, "WiFi Security–The Only Way is...

Bookmark and Share     0 Comments     RSS Feed     Email a friend


May 1, 2008  1:16 AM

Does Encryption Have You Complacent About Physical Security?



Posted by: Ken Harthun
Mobile, Security, Security management, Security maxim

There's no question that data security is senior to physical security. The real value in a stolen laptop or PC isn't in the hardware, it's in the data. Sure, some druggie might steal your laptop and sell it for a fix, but the real danger lies in the thief who knows the value of the files that are...


April 27, 2008  4:02 PM

If Your Laptop is Stolen, Will Your Identity be Stolen?



Posted by: Ken Harthun
Encryption, Mobile, Portable computing, Security, Security maxim

We frequently hear news of a laptop holding sensitive information having been stolen. Bad in itself, but the reports often note that the information was unencrypted. Doubly bad. The news rarely focuses on personal laptop thefts, however because there's no news value in reporting the loss of Joe...


1

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: