Wireless Network Security: Setup, Issues and Threats news, help and research - SearchSecurity.co.UK

Wireless Network Security: Setup, Issues and Threats

Email Alerts

Register now to receive SearchSecurity.co.uk-related news, tips and more, delivered to your inbox.
By submitting your personal information, you agree to receive emails regarding relevant products and special offers from TechTarget and its partners. You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.
  • Infosecurity 2012 Europe: Conference news and highlights

    Get the latest news and important research from the Infosecurity 2012 Europe conference, including coverage on security threats and data breaches. 

  • IT in Europe, Security Edition: Smartphone security issues

    How can security teams manage devices they don’t control? Find out how to manage smartphone and tablet security threats. 

  • Roundup: University case studies on innovative security products

    Browse this collection of university case studies from colleges that have successfully implemented innovative security products. 

  • Information Security Learning Guides

    A repository of our Learning Guides. 

  • Wi-Fi vulnerability assessment checklist

    Vulnerability assessments can help you find and fix WLAN weaknesses before attackers take advantage of them. But where do you start? What should you look for? Have you covered all the bases? This checklist will help to answer these questions. 

  • Defeating Evil Twin attacks

    Evil Twins pose a clear and present danger to wireless users on public and private WLANs. This tip describes steps that you can take to defend users against this poorly-understood attack. Learn why SSL or SSH may not be enough to protect your users a... 

  • Wireless attacks, A to Z

    In our buzzword-filled industry, wrapping your arms around wireless attacks and their potential business impacts can be tough. This tip tries to bring order to this chaos by providing a reference list of attacks against 802.11 and 802.1X, categorized... 

  • Controlling WLAN access on a tight budget

    WPA and WPA2-Enterprise provide robust WLAN access control, but deploying 802.1X can be overwhelming for companies with limited IT staff and budget. From outsource to open source to preshared keys, this tip describes several less complex or costly al... 

  • Recipe for rogue hunting

    Detecting rogues is fairly easy, but eliminating them can be surprisingly tough. This tip describes a methodical rogue hunting process and tools that can help. 

  • The ins and outs of AP placement

    Many installers make the mistake of treating 802.11 WLANs just like Ethernet, placing access points (APs) in locations that facilitate outsider access to corporate networks. But, from a security perspective, WLANs should be treated like the Internet ... 

  • See more Essential Knowledge on Wireless Network Security: Setup, Issues and Threats
About Wireless Network Security: Setup, Issues and Threats

Get advice and information on how to build and setup wireless network security to avoid wireless security issues and threats like hacking. Prevent network problems and learn how to securely set up your wireless network.