WBA Recognition Awards-Contributor- Alan Dekok - NetworkRADIUS

Building trust in RADIUS: DeKok honored for work at Wireless Broadband Alliance  

NetworkRADIUS CEO Alan DeKok was recognized for his efforts to improve the reliability of RADIUS accounting with the Wireless Broadband Alliance’s RADIUS Accounting Assurance work group. The post Building trust in RADIUS: ...
FCC fines wireless carriers $200 million for sharing user location data!

FCC Fines Wireless Carriers $200 million, Google’s Fight Against Malicious Apps

In episode 328, Tom and Kevin discuss two major cybersecurity and privacy news stories. The first topic covers the FCC issuing fines to major US wireless carriers for sharing users’ real-time location ...
Private 5G, Wi-Fi, cyberattacks, nation-state, security, 5G networks, landscape, CISA SASE Security

Gaining Security and Flexibility With Private 5G

Private 5G is considered a safer alternative to Wi-Fi and public mobile networks and is the preferred network backbone for business-critical apps ...
Security Boulevard
A Basic Guide to Router and Wireless Security for Regular People

A Basic Guide to Router and Wireless Security for Regular People

| | networking, wireless
Router and wireless security for the home/small network is often overlooked due to the limitations of consumer grade hardware and general lack of awareness of network security (NetSec). As such, many users ...
PCI and Wireless Technologies

PCI and Wireless Technologies

While using wireless technologies in a PCI environment can be tricky, it is possible to configure it appropriately and obtain […] ...
Private 5G, Wi-Fi, cyberattacks, nation-state, security, 5G networks, landscape, CISA SASE Security

CISA, DHS, DoD Release 5G Security Evaluation Process

The Cybersecurity and Infrastructure Security Agency (CISA) released a proposed five-step 5G Security Evaluation Process. The document is designed to help agencies looking to adopt 5G technology conduct the preparation for the ...
Security Boulevard
EH-Net - Wylie - Wireless Pentesting Part 4 – Performing an Actual Wireless Pentest

Wireless Pentesting Part 4 – Performing an Actual Wireless Pentest

In the previous article of this series, “Wireless Pentesting Part 3 – Common Wireless Attacks”, we discussed various scenarios to give you a better grasp of how wireless networks and clients can ...
EH-Net - Wylie - Wireless Pentesting Part 3 - Common Wireless Attacks

Wireless Pentesting Part 3 – Common Wireless Attacks

In the previous article of this series, “Wireless Pentesting Part 2 – Building a WiFi Hacking Rig”, we discussed building a WiFi hacking rig. We covered the hardware, operating systems, and software ...

Bluetooth Vulnerability: BIAS

This is new research on a Bluetooth vulnerability (called BIAS) that allows someone to impersonate a trusted device: Abstract: Bluetooth (BR/EDR) is a pervasive technology for wireless communication used by billions of ...