wifi microscope

Hacking Christmas Gifts: Putting IoT Under the Microscope

If high-tech gadgets are on your holiday shopping list, it is worth taking a moment to think about the particular risks they may bring. Under the wrong circumstances, even an innocuous gift ...
EH-Net - Wylie - Wireless Pentesting Part 4 – Performing an Actual Wireless Pentest

Wireless Pentesting Part 4 – Performing an Actual Wireless Pentest

In the previous article of this series, “Wireless Pentesting Part 3 – Common Wireless Attacks”, we discussed various scenarios to give you a better grasp of how wireless networks and clients can ...
EH-Net - Wylie - Wireless Pentesting Part 3 - Common Wireless Attacks

Wireless Pentesting Part 3 – Common Wireless Attacks

In the previous article of this series, “Wireless Pentesting Part 2 – Building a WiFi Hacking Rig”, we discussed building a WiFi hacking rig. We covered the hardware, operating systems, and software ...

F5 BIG-IP Exploit, WiFi Router Security Updates, Password Reuse

In episode 129 for July 13th 2020: Impact of the F5-BIG-IP critical vulnerability, security updates and your WiFi router, and details about new research that shows how billions of compromised credentials are ...
g suite passpoint

Can I Use Passpoint with G-Suite?

Passpoint is the premier tool for ensuring your users have network access while roaming, but it can be a little difficult to deploy. Fortunately, SecureW2 has a solution that integrates into your ...

Can I Use The Okta RADIUS Agent For My Wi-Fi?

An Okta RADIUS server agent is a lightweight program that runs as a service outside of Okta. It is usually installed outside of a firewall which gives Okta a route to communicate ...

Microsoft Buys Corp.com

A few months ago, Brian Krebs told the story of the domain corp.com, and how it is basically a security nightmare: At issue is a problem known as "namespace collision," a situation ...
Going Remote: Transitioning from In-Office to At-Home in 3 Days | JumpCloud Webinar

Going Remote: Transitioning from In-Office to At-Home in 3 Days

Learn how our IT leaders effectively and securely transitioned JumpCloud’s entire workforce to remote work in just three days. The post Going Remote: Transitioning from In-Office to At-Home in 3 Days appeared ...
How to Secure a Home WiFi Network for Remote Work

How to Secure a Home WiFi Network for Remote Work

Take these six concrete steps to ensure that your home WiFi network and asociated hardware is secure and properly configured for remote work. The post How to Secure a Home WiFi Network ...
RawCap

RawCap Redux

A new version of RawCap has been released today. This portable little sniffer now supports writing PCAP data to stdout and named pipes as an alternative to saving the captured packets to ...