wireless security - News, Features, and Slideshows

News about wireless security
  • 10 Hot Security Startups to Watch

    Tablets and smartphones, which employees are bringing into work in "Bring Your Own Device" (BYOD) style, are leading IT managers to ask security questions, starting with whether they should sort out corporate mobile apps and data from personal ones. It's all encouraged a spate of security start-ups to come up with their own answers, and highlighted here are a few that have recently hung out a shingle for mobile security. But it's not just mobile spurring the creation of young security firms out to change the world.

  • How to lock down your wireless network

    If you operate a wireless network for your home or business, it's important to ward it against opportunistic hackers seeking to steal your data or hijack your Wi-Fi for their own nefarious purposes. We spoke to Steven Andrés, CTO of security consulting firm Special Ops Security, to learn about the best ways to lock down your Wi-Fi. To get started, you'll need to log in to your router's administrative console by typing the router's IP address into your Web browser's address bar. Most routers use a common address like 192.168.1.1, though alternatives like 192.168.0.1 and 192.168.2.1 are also common. Check the manual that came with your router to determine the correct IP address; if you've lost your manual, you can usually find the appropriate IP address on the manufacturer's website.

  • Mobile users want privacy, do little to protect it

    While large numbers of consumers are angry about security measures taken by custodians of their online data, three out of every four of them don't even take minimal measures to protect themselves from incursions on their privacy.

  • How to set up and maintain a wireless workplace

    Wireless networks aren't just a convenience anymore; they've become an essential part of business culture. It's nearly impossible to walk into a workplace that doesn't use Wi-Fi in some fashion. For the millions of portable wireless devices--from traditional laptops to smartphones and tablets (including Apple's iDevices and the ever-expanding menagerie of Android-based gear)--that people carry with them today, Wi-Fi is the great connector, providing an industry-standard communication layer for untethered devices.

Tutorials about wireless security
Features about wireless security
  • Steps to secure your smartphone against data theft

    You may already know the basics of Internet security and keeping your personal data private while browsing the Web: Use a firewall, don't open attachments you aren't expecting, and never follow links from strangers. But what about your smartphone? The ease with which security researcher Georgia Weidman was able to infect Android phones with her custom botnet during the 2011 ShmooCon security conference suggests that anyone concerned about the privacy of the personal data stored on their smartphone should think twice before downloading dubious or otherwise untrustworthy apps.