IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Wireless Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: mSecurity, Wireless LAN Security, Wi-Fi Security, Wireless Network Security, WLAN Security, Mobile Security
DEFINITION: Bluesnarfing is the theft of information from a wireless device through a Bluetooth connection. Bluetooth is a high-speed but very short-range wireless technology for exchanging data between desktop and mobile computers, personal digital assistants (PDAs), and other devices. By exploiting a vulnerability in the way Bluetooth is implemented on a mobile phone, an attacker can access information -- such  … 
Definition continues below.
Wireless SecurityReports
176 - 200 of 235 Matches Previous Page  | Next Page
5 warning signs your email is in trouble
sponsored by Good Technology
WEBCAST: Learn the five tell-tale signs that it's time to create or rework your mobile technology strategy
Posted: 31 Aug 2007 | Premiered: Aug 31, 2007, 09:00 EDT (13:00 GMT)

Good Technology

eBook: Priorities: Despite Economic Uncertainty, Spending on Information Security Remains Strong
sponsored by SearchSecurity.co.UK
EBOOK: Check out this expert eBook and learn about the security issues that are receiving increased focus in the UK for 2009 and get tips for addressing these challenges.
Posted: 18 Dec 2008 | Published: 18 Dec 2008

SearchSecurity.co.UK

eBook: Mobile Security: Protecting Mobile Devices, Data Integrity and Your Corporate Network
sponsored by SearchMobileComputing
EBOOK: Structured in four in-depth chapters, this E-Book will provide an objective perspective into the key defenses against device and data loss, network compromise and mobile malware.
Posted: 09 Dec 2008 | Published: 09 Dec 2008

SearchMobileComputing

Blackberry Enterprise Solution: Security Technical Overview
sponsored by BlackBerry
WHITE PAPER: This document describes the security features of the BlackBerry Enterprise Solution and provides an overview of the BlackBerry security architecture.
Posted: 09 Dec 2008 | Published: 09 Dec 2008

BlackBerry

WEP Cloaking for Legacy Encryption Protection
sponsored by Motorola, Inc.
WHITE PAPER: Several known vulnerabilities and attack tools have compromised Wired Equivalent Privacy (WEP), making it unsuitable for secure WLAN implementations without additional layers of security. This white paper describes a WEP Cloaking solution.
Posted: 10 Nov 2008 | Published: 10 Nov 2008

Motorola, Inc.

Wireless Networking: Five Questions to Start With
sponsored by Cisco Systems, Inc.
WHITE PAPER: This paper answers five questions about wireless networking, allowing you and your employees to stay connected to your company's information resources virtually anytime, anywhere.
Posted: 10 Oct 2008 | Published: 10 Oct 2008

Cisco Systems, Inc.

Getting the Most from Your Wireless Network
sponsored by WildPackets, Inc.
WHITE PAPER: Network disruptions have become business disruptions with financial and sometimes even legal consequences. This white paper outlines best practices in monitoring, analyzing, and troubleshooting wireless networks using WildPackets OmniPee.
Posted: 26 Aug 2008 | Published: 26 Aug 2008

WildPackets, Inc.

Five Ways to Improve Your Wireless Security
sponsored by Cisco Systems, Inc.
TECHNICAL ARTICLE: A wireless network can help your employees stay productive as they move around your company, but to take advantage of the benefits of wireless networking, you need to be sure that your network is safe from hackers and unauthorized users.
Posted: 10 Jul 2008 | Published: 01 Feb 2008

Cisco Systems, Inc.

Fast and Cost-Effective Unified Communications for Your Business
sponsored by Cisco Systems, Inc.
BROCHURE: The Cisco Unified Wireless Network is the industry's only unified wired and wireless solution to cost-effectively address the wireless LAN (WLAN) security, deployment, management, and control issues facing enterprises. Learn more in this brochure.
Posted: 10 Jul 2008 | Published: 01 Aug 2007

Cisco Systems, Inc.

Security for Wireless Networks: A Comparison among SSL, IPSec and Mobile VPNs
sponsored by NetMotion Wireless
WHITE PAPER: This paper outlines common threats and issues regarding wireless security in the context of typical uses of mobile devices over wireless networks and evaluates secure remote access solutions in comparison with NetMotion Mobility XE.
Posted: 27 Jun 2008 | Published: 01 Jun 2008

NetMotion Wireless

Automotive Repair Shop Increases Productivity and Improves Customer Service
sponsored by Cisco Systems, Inc.
VIDEOCAST: In this case study, read how Seyfer Automotive implemented a new communications system freed up 30 minutes daily for the service manager, resulting in one to two additional daily repair jobs worth US$200 to $US400.
Posted: 26 Jun 2008 | Premiered: Jun 26, 2008

Cisco Systems, Inc.

Eco-Friendly Materials Importer Uses Technology to Grow
sponsored by Cisco Systems, Inc.
VIDEOCAST: In this video case study watch how amaZulu, an eco-friendly company that imports natural architectural materials from villages all around the world, uses Cisco technology to improve customer service and productivity.
Posted: 26 Jun 2008 | Premiered: Jun 26, 2008

Cisco Systems, Inc.

Trade Show Management Firm Increases Responsiveness
sponsored by Cisco Systems, Inc.
VIDEOCAST: Read how Everything Tradeshows utilized Cisco Smart Business Communications System to enable faster response to customer message, increase outbound telemarketing activity and reduce costs.
Posted: 26 Jun 2008 | Premiered: Jun 26, 2008

Cisco Systems, Inc.

Housing Association Puts Staff into the Community, Increasing Personal Contact
sponsored by Cisco Systems, Inc.
VIDEOCAST: This case study showcases how The Community Gateway Association (CGA) became the first housing association in England to be set up as a 'community gateway'.
Posted: 26 Jun 2008 | Premiered: Jun 26, 2008

Cisco Systems, Inc.

Medical Office Increases Productivity with New Communications System
sponsored by Cisco Systems, Inc.
VIDEOCAST: This video case study showcases a physician's practice implementing a phone system and reducing time required for appointment reminder calls from four hours to 15 minutes per day and achieving efficient contact with insurance companies.
Posted: 26 Jun 2008 | Premiered: Jun 26, 2008

Cisco Systems, Inc.

Enterprise Wireless LAN Security
sponsored by Motorola, Inc.
WHITE PAPER: This paper describes the security challenges network administrators face defining and implementing security mechanisms within diverse wired and wireless network environments.
Posted: 29 May 2008 | Published: 01 May 2008

Motorola, Inc.

Dispelling Top Ten Wireless Security Myths
sponsored by AirTight Networks, Inc.
WHITE PAPER: Myths about wireless security can be both dangerous and costly, this paper will revisit and debunk top ten wireless security myths.
Posted: 16 May 2008 | Published: 01 May 2008

AirTight Networks, Inc.

Airspace Risk Assessment
sponsored by AirTight Networks, Inc.
WHITE PAPER: This report is the first step towards wireless vulnerability assessment of your network and managing its wireless security posture.
Posted: 16 May 2008 | Published: 01 May 2008

AirTight Networks, Inc.

SSL VPN for Secure Wireless LAN Access
sponsored by F5 Networks
WHITE PAPER: For most deployment scenarios, an SSL VPN appliance can provide many of the features and benefits of a special purpose WLAN controller for wireless access, but at a much lower cost and with greater flexibility. This paper describes the key sell...
Posted: 28 Apr 2008 | Published: 01 Oct 2007

F5 Networks

Introduction to the IP Multimedia Subsystem (IMS): IMS Basic Concepts and Terminology
sponsored by F5 Networks
WHITE PAPER: IMS is a whole new way to deliver multimedia regardless of the device or the access medium. This paper will change the way you relate to an increasingly digital world.
Posted: 28 Apr 2008 | Published: 01 Aug 2007

F5 Networks

Unified Threat Management: The Best Defense against Blended Threats
sponsored by SonicWALL
WHITE PAPER: The SonicWALL® Unified Threat Management solution (UTM) provides the most intelligent, real-time network protection against sophisticated application-layer and content-based attacks.
Posted: 28 Apr 2008 | Published: 01 Jan 2005

SonicWALL

Wireless Site Survey Best Practices
sponsored by Fluke Networks
WHITE PAPER: This paper provides insight into best practices for executing wireless site surveys.
Posted: 24 Apr 2008 | Published: 01 Apr 2008

Fluke Networks

Cisco Secure Wireless Office Solution for SMBs
sponsored by Cisco Systems, Inc.
SOFTWARE LISTING: Designed for today's increasingly mobile businesses, the Cisco® Secure Wireless Office Solution helps enhance productivity by making information and business applications accessible anywhere, anytime.
Posted: 28 Feb 2008 | Published: 01 Jan 2006

Cisco Systems, Inc.

Increase Productivity and Reduce Security Risks for Teleworkers
sponsored by SonicWALL
WHITE PAPER: This paper provides an overview of how teleworking helps meet today's productivity demands. It discusses additional network security risks that anywhere access can create, and how SonicWALL addresses these concerns while offering additional benefits.
Posted: 23 Jan 2008 | Published: 22 Jan 2008

SonicWALL

Managing Mobility: An IT Perspective
sponsored by Nokia
WHITE PAPER: Today's workforce is rapidly becoming mobile and businesses are looking at how to capitalize on the significant benefits of enterprise mobility. This white paper examines the issues surrounding the security, manageability and costof mobility.
Posted: 15 Oct 2007 | Published: 01 Jan 2006

Nokia
176 - 200 of 235 Matches Previous Page    6 7 8 9 10    Next Page
 
WIRELESS SECURITY DEFINITION (continued): …  as the user's calendar, contact list and e-mail and text messages -- without leaving any evidence of the attack. Other devices that use Bluetooth, such as laptop computers, may also be vulnerable, although to a lesser extent, by virtue of their more complex systems. Operating in invisible mode protects some devices, but others are vulnerable as long as Bluetooth is enabled.According to a ZDNet UK article, attackers are exploiting a problem with some implementations of the object exchange (OBEX) protocol, which is commonly used to exchange information between wireless devices. An attacker can synchronize … 
Wireless Security definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement