wifi
Hacking Christmas Gifts: Putting IoT Under the Microscope
If high-tech gadgets are on your holiday shopping list, it is worth taking a moment to think about the particular risks they may bring. Under the wrong circumstances, even an innocuous gift ...
Wireless Pentesting Part 4 – Performing an Actual Wireless Pentest
In the previous article of this series, “Wireless Pentesting Part 3 – Common Wireless Attacks”, we discussed various scenarios to give you a better grasp of how wireless networks and clients can ...
Wireless Pentesting Part 3 – Common Wireless Attacks
In the previous article of this series, “Wireless Pentesting Part 2 – Building a WiFi Hacking Rig”, we discussed building a WiFi hacking rig. We covered the hardware, operating systems, and software ...
F5 BIG-IP Exploit, WiFi Router Security Updates, Password Reuse
In episode 129 for July 13th 2020: Impact of the F5-BIG-IP critical vulnerability, security updates and your WiFi router, and details about new research that shows how billions of compromised credentials are ...
Can I Use Passpoint with G-Suite?
Passpoint is the premier tool for ensuring your users have network access while roaming, but it can be a little difficult to deploy. Fortunately, SecureW2 has a solution that integrates into your ...
Can I Use The Okta RADIUS Agent For My Wi-Fi?
An Okta RADIUS server agent is a lightweight program that runs as a service outside of Okta. It is usually installed outside of a firewall which gives Okta a route to communicate ...
Microsoft Buys Corp.com
A few months ago, Brian Krebs told the story of the domain corp.com, and how it is basically a security nightmare: At issue is a problem known as "namespace collision," a situation ...
Going Remote: Transitioning from In-Office to At-Home in 3 Days
Learn how our IT leaders effectively and securely transitioned JumpCloud’s entire workforce to remote work in just three days. The post Going Remote: Transitioning from In-Office to At-Home in 3 Days appeared ...
How to Secure a Home WiFi Network for Remote Work
Take these six concrete steps to ensure that your home WiFi network and asociated hardware is secure and properly configured for remote work. The post How to Secure a Home WiFi Network ...
RawCap Redux
A new version of RawCap has been released today. This portable little sniffer now supports writing PCAP data to stdout and named pipes as an alternative to saving the captured packets to ...

