The ABCs of securing your wireless network

Sunday, May 4th, 2008

Ars Technica's original Wireless Security Blackpaper was first published back in 2002, and in the intervening years, it has been a great reference for getting the technical lowdown on different wireless security protocols. As a sequel to the original blackpaper, we wanted to do something a little more basic and ...

Wireless modem considerations

Thursday, May 1st, 2008

I am pretty sure that there are a number of you out there reading this blog over a wireless network. Given that wireless is so widely distributed these days, its not uncommon that users are unaware of how insecure their wireless setup maybe. Unfortunately one other reality is that a number ...

Detecting Rogue Wireless

Monday, April 28th, 2008

Wireless networking technologies are a rich playground for hackers -- both ethical penetration testers and malicious attackers. There are many avenues of attack, ranging from attacking the infrastructure, the clients, or the actual traffic through man-in-the-middle sniffing and manipulation. Rich Mogull covered the wireless “Evil Twin” attack in his recent ...

Protect Yourself From PC Security Pitfalls

Wednesday, April 23rd, 2008

Our columnist shows you how to get rid of spyware, shrug off spam, and stay safe on unsecured public networks. Viruses, spyware, and worms. Oh, my! We all know the dangers inherent in accessing the Internet, and we all take precautions. Yet our PCs still occasionally get infected because we can't know ...

How to disable USB storage devices

Monday, April 21st, 2008

With all the high storage devices like the iPod classic going up to 160GB and just fitting in your inside pocket, people are getting more scared of data loss. Even Dave Lewis from Liquidmatrix recently saw someone at a client site using an iPod to pull corporate data onto it ...