Here you can learn about specific topics in wireless security and new developments in the field of wireless LANs.
Security researchers at AirTight have uncovered a vulnerability called "Hole196" in the WPA2 security protocol that exposes WPA2-secured Wi-Fi networks to malicious insiders.
WiFish Finder is a tool for assessing whether WiFi devices active in the air are vulnerable to 'Wi-Fishing' attacks. Assessment is performed through a combination of passive traffic sniffing and active probing techniques.
Key Findings Demonstrate a Pattern of Wireless Data Leakage and Poor Security Practices in Six U.S. Cities and London
WPA’s stature as a secure protocol was recently challenged (in November 2008) for the first time. TKIP, an essential encryption component of WPA, which was heralded for years as the replacement for the broken WEP encryption, was shown to be vulnerable to a packet injection exploit.
Some vendors integrate security into their wireless LAN infrastructure to make it self-defending. Learn about new vulnerabilities that turn the so-called self-defending networks into self-destructing ones.
Learn about this exciting next generation WLAN technology. Get answers to most frequently asked questions about 802.11n. Use the free WLAN Coverage Estimator to plan and estimate the costs of migration to 802.11n. Optimize your 802.11n investment for WLAN infrastructure and security.
Survey of several airports in the US and worldwide exposes wireless malpractices at these airports.
The term “viral SSID” has started to emerge across media as a potent security threat for WiFi computers. However, the current understanding of the causes and implications of this phenomenon is unclear. This article demystifies the concept of viral SSIDs.
Learn how easily a hacker can expose and exploit wireless vulnerabilities using wardriving.
Short notes on the basics of WEP and what makes it vulnerable.
The Caffé Latte attack debunks the age old myth that to crack WEP, the attacker needs to be in the RF vicinity of the authorized network, with at least one functional AP up and running. We demonstrate that it is possible to retrieve the WEP key from an isolated client.
Short notes on basics of 802.11i
A tutorial on capacity, QoS and security related advances in IEEE 802.11, essentially 802.11n, 802.11e, 802.11i and 802.11w.
Featured White Paper