The Anatomy of a Vishing Scam

Saturday, March 15th, 2008

A series of well-orchestrated wireless phone-based phishing attacks against several financial institutions last week illustrates how scam artists are growing more adept at fleecing consumers by exploiting security holes in seemingly unrelated Internet technologies. The scams in this case took the form of a type of phishing known as "vishing," wherein ...

Linksys Rolls Out Faster Wi-Fi Products

Saturday, March 8th, 2008

The biggest seller of home wireless LAN equipment is set to launch its gear for the next technology generation on Monday, introducing three products based on a draft of the IEEE 802.11n standard. The still-emerging standard is designed to deliver at least 100 megabits per second of real throughput. That's more ...

Securing Wi-Fi Networks Doesn’t Have To Be Painful

Saturday, March 8th, 2008

Years ago, in a strip drawn by the great cartoonist Walt Kelly, the characters were following a set of mysterious footprints through the swamp in which they lived. Finally, one of the characters, Pogo, a little opossum, realized that the footprints were their own. That's when he made his much ...

The six dumbest ways to secure a wireless LAN

Saturday, March 8th, 2008

For the last three years, I?ve been meaning to put to rest once and for all the urban legends and myths on wireless LAN security. Every time I write an article or blog on wireless LAN security, someone has to come along and regurgitate one of these myths. If that ...

Keeping Intruders Out Of Your WLAN

Saturday, March 8th, 2008

Wireless LANs utilize radio waves for transporting information, which results in security vulnerabilities that justifiably worry network managers. To assuage those worries, most companies implement authentication and encryption to harden security. However, WLANs have a whole host of other vulnerabilities that can be more difficult to completely smother such as ...