5G CISA SASE Security

CISA, DHS, DoD Release 5G Security Evaluation Process

The Cybersecurity and Infrastructure Security Agency (CISA) released a proposed five-step 5G Security Evaluation Process. The document is designed to help agencies looking to adopt 5G technology conduct the preparation for the ...
Security Boulevard
EH-Net - Wylie - Wireless Pentesting Part 4 – Performing an Actual Wireless Pentest

Wireless Pentesting Part 4 – Performing an Actual Wireless Pentest

In the previous article of this series, “Wireless Pentesting Part 3 – Common Wireless Attacks”, we discussed various scenarios to give you a better grasp of how wireless networks and clients can ...
EH-Net - Wylie - Wireless Pentesting Part 3 - Common Wireless Attacks

Wireless Pentesting Part 3 – Common Wireless Attacks

In the previous article of this series, “Wireless Pentesting Part 2 – Building a WiFi Hacking Rig”, we discussed building a WiFi hacking rig. We covered the hardware, operating systems, and software ...

Bluetooth Vulnerability: BIAS

This is new research on a Bluetooth vulnerability (called BIAS) that allows someone to impersonate a trusted device: Abstract: Bluetooth (BR/EDR) is a pervasive technology for wireless communication used by billions of ...
EH-Net - Wyllie - Wireless Pentesting Part 2 - Building a WiFi Hacking Rig

Wireless Pentesting Part 2 – Building a WiFi Hacking Rig

In the first article of this series, “Wireless Pentesting Part 1 – An Overview”, we reviewed some penetration testing basics with the PTES and what one can expect to know about a ...
EH-Net - Wylie - Wireless Pentesting Part 1 – An Overview

Wireless Pentesting Part 1 – An Overview

As networks and computing systems have become more secure through the evolution of next generation firewalls, intrusion prevention systems (IPS), and endpoint security, attackers have shifted their focus. Web applications, mobile devices ...

Aaron Zar, Co-Founder and CEO of Silent Pocket

On this special edition of the podcast we speak with Aaron Zar, co-founder and CEO of Silent Pocket. Silent Pocket has been a long time sponsor of the show and it was ...
Cracking WPA Pre Shared Keys

Cracking WPA Pre Shared Keys

Cracking WPA Pre Shared Keys This is intended to be part 2 of a previous blog (Intro to Wireless Security), which was designed to introduce people to the realm of wireless security ...
The Internet of Things (IoT) and digitally stored PII: Avoidable or Inevitable? 

The Internet of Things (IoT) and Digitally Stored PII: Avoidable or Inevitable? 

The Internet of Things (IoT) is rapidly showing up in all facets of daily life and collecting personally identifiable information (PII) in massive quantities. From smart home thermostats to one-click purchasing, IoT devices ...
John Busso

Protect Your Network with Wireless Security

Around the Millenium when 802.11 was ratified, any measure of security was enough; just having an SSID that was closed was “security”. Then came WEP to stop unauthorized access, however, that was ...