Wireless Network Security: Setup, Issues and Threats news, help and research - SearchSecurity.co.UK

Wireless Network Security: Setup, Issues and Threats

Email Alerts

Register now to receive SearchSecurity.co.uk-related news, tips and more, delivered to your inbox.
By submitting your personal information, you agree to receive emails regarding relevant products and special offers from TechTarget and its partners. You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.
  • Infosecurity 2012 Europe: Conference news and highlights

    Get the latest news and important research from the Infosecurity 2012 Europe conference, including coverage on security threats and data breaches. 

  • IT in Europe, Security Edition: Smartphone security issues

    How can security teams manage devices they don’t control? Find out how to manage smartphone and tablet security threats. 

  • Roundup: University case studies on innovative security products

    Browse this collection of university case studies from colleges that have successfully implemented innovative security products. 

  • Information Security Learning Guides

    A repository of our Learning Guides. 

  • Wi-Fi vulnerability assessment checklist

    Vulnerability assessments can help you find and fix WLAN weaknesses before attackers take advantage of them. But where do you start? What should you look for? Have you covered all the bases? This checklist will help to answer these questions. 

  • Defeating Evil Twin attacks

    Evil Twins pose a clear and present danger to wireless users on public and private WLANs. This tip describes steps that you can take to defend users against this poorly-understood attack. Learn why SSL or SSH may not be enough to protect your users a... 

  • Using VLANs to compartmentalize WLAN traffic

    Virtual LANs have long been used within enterprise networks to create logical workgroups, independent of physical location or LAN topology. This tip describes how to use these same VLAN capabilities, found in both wired and wireless devices, to tag a... 

  • Wireless attacks, A to Z

    In our buzzword-filled industry, wrapping your arms around wireless attacks and their potential business impacts can be tough. This tip tries to bring order to this chaos by providing a reference list of attacks against 802.11 and 802.1X, categorized... 

  • Controlling WLAN access on a tight budget

    WPA and WPA2-Enterprise provide robust WLAN access control, but deploying 802.1X can be overwhelming for companies with limited IT staff and budget. From outsource to open source to preshared keys, this tip describes several less complex or costly al... 

  • Fighting wireless DoS attacks

    Despite recent 802.11 security advances, WLANs remain very vulnerable to Denial of Service attacks. While you may not be able to prevent DoS attacks, a WIDS can help you detect when DoS attacks occur and where they come from, so that you can track th... 

  • See more Essential Knowledge on Wireless Network Security: Setup, Issues and Threats
About Wireless Network Security: Setup, Issues and Threats

Get advice and information on how to build and setup wireless network security to avoid wireless security issues and threats like hacking. Prevent network problems and learn how to securely set up your wireless network.