wireless
PCI and Wireless Technologies
While using wireless technologies in a PCI environment can be tricky, it is possible to configure it appropriately and obtain […] ...
CISA, DHS, DoD Release 5G Security Evaluation Process
The Cybersecurity and Infrastructure Security Agency (CISA) released a proposed five-step 5G Security Evaluation Process. The document is designed to help agencies looking to adopt 5G technology conduct the preparation for the ...
Wireless Pentesting Part 4 – Performing an Actual Wireless Pentest
In the previous article of this series, “Wireless Pentesting Part 3 – Common Wireless Attacks”, we discussed various scenarios to give you a better grasp of how wireless networks and clients can ...
Wireless Pentesting Part 3 – Common Wireless Attacks
In the previous article of this series, “Wireless Pentesting Part 2 – Building a WiFi Hacking Rig”, we discussed building a WiFi hacking rig. We covered the hardware, operating systems, and software ...
Bluetooth Vulnerability: BIAS
This is new research on a Bluetooth vulnerability (called BIAS) that allows someone to impersonate a trusted device: Abstract: Bluetooth (BR/EDR) is a pervasive technology for wireless communication used by billions of ...
Wireless Pentesting Part 2 – Building a WiFi Hacking Rig
In the first article of this series, “Wireless Pentesting Part 1 – An Overview”, we reviewed some penetration testing basics with the PTES and what one can expect to know about a ...
Wireless Pentesting Part 1 – An Overview
As networks and computing systems have become more secure through the evolution of next generation firewalls, intrusion prevention systems (IPS), and endpoint security, attackers have shifted their focus. Web applications, mobile devices ...
Aaron Zar, Co-Founder and CEO of Silent Pocket
On this special edition of the podcast we speak with Aaron Zar, co-founder and CEO of Silent Pocket. Silent Pocket has been a long time sponsor of the show and it was ...
Cracking WPA Pre Shared Keys
Cracking WPA Pre Shared Keys This is intended to be part 2 of a previous blog (Intro to Wireless Security), which was designed to introduce people to the realm of wireless security ...
The Internet of Things (IoT) and Digitally Stored PII: Avoidable or Inevitable?
The Internet of Things (IoT) is rapidly showing up in all facets of daily life and collecting personally identifiable information (PII) in massive quantities. From smart home thermostats to one-click purchasing, IoT devices ...