wireless

Building trust in RADIUS: DeKok honored for work at Wireless Broadband Alliance
NetworkRADIUS CEO Alan DeKok was recognized for his efforts to improve the reliability of RADIUS accounting with the Wireless Broadband Alliance’s RADIUS Accounting Assurance work group. The post Building trust in RADIUS: ...

FCC Fines Wireless Carriers $200 million, Google’s Fight Against Malicious Apps
In episode 328, Tom and Kevin discuss two major cybersecurity and privacy news stories. The first topic covers the FCC issuing fines to major US wireless carriers for sharing users’ real-time location ...

Gaining Security and Flexibility With Private 5G
Private 5G is considered a safer alternative to Wi-Fi and public mobile networks and is the preferred network backbone for business-critical apps ...

A Basic Guide to Router and Wireless Security for Regular People
Router and wireless security for the home/small network is often overlooked due to the limitations of consumer grade hardware and general lack of awareness of network security (NetSec). As such, many users ...

Common Sense Advice for Hacker Summer Camp, AI Chatbot Attacks, What’s a Flipper Zero?
In this episode, we discuss our common sense tips to stay safe and secure while attending “Hacker Summer Camp”: BSides, Black Hat, and DEF CON hacking conferences in Las Vegas. Next, we ...

PCI and Wireless Technologies
While using wireless technologies in a PCI environment can be tricky, it is possible to configure it appropriately and obtain […] ...

CISA, DHS, DoD Release 5G Security Evaluation Process
The Cybersecurity and Infrastructure Security Agency (CISA) released a proposed five-step 5G Security Evaluation Process. The document is designed to help agencies looking to adopt 5G technology conduct the preparation for the ...

Wireless Pentesting Part 4 – Performing an Actual Wireless Pentest
In the previous article of this series, “Wireless Pentesting Part 3 – Common Wireless Attacks”, we discussed various scenarios to give you a better grasp of how wireless networks and clients can ...

Wireless Pentesting Part 3 – Common Wireless Attacks
In the previous article of this series, “Wireless Pentesting Part 2 – Building a WiFi Hacking Rig”, we discussed building a WiFi hacking rig. We covered the hardware, operating systems, and software ...
Bluetooth Vulnerability: BIAS
This is new research on a Bluetooth vulnerability (called BIAS) that allows someone to impersonate a trusted device: Abstract: Bluetooth (BR/EDR) is a pervasive technology for wireless communication used by billions of ...