Articles News Reviews Releases Downloads Contact Us White Papers

Locking out wireless intruders


When Intel introduced the Centrino chip in early 2003, laptop users cheered that they'd no longer be scanning the shelves of Best Buy in search of separate wireless cards for their new mobile computers. In contrast, IT staff cringed with the knowledge that built-in wireless cards in the hands of users who weren't technically savvy could wreak havoc on efforts to keep their companies' wireless networks secure.

"Wireless networks are particularly vulnerable to security breaches and attacks because the signal is wide open," explained Chuck Conley, vice president of marketing for Newbury Networks. The executive for the wireless security provider noted that, "for the first time in computing history, you don't know where your device or your user is. And because you don't know where that user is, you also sometimes don't know who that user is."

Read Full Story


News
20 ways to Secure your Apache Configuration
Jun 16, 2006, 15:03 EST
Layered Encryption, an Absolute Necessity
Jun 16, 2006, 15:01 EST
Phishing scam uses PayPal secure servers
Jun 16, 2006, 13:32 EST
IPLocks Closes $11 Million in Strategic Funding
Jun 16, 2006, 08:34 EST
Doombot Worm Spreads Via Phishing Model Attack
Jun 16, 2006, 07:14 EST
Fusion Softphone Turns Computer into VoIP Telephone
Jun 16, 2006, 06:17 EST
Genuine Advantage is Microsoft spyware
Jun 16, 2006, 06:09 EST




Site Meter