IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Wireless Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: mSecurity, Wireless LAN Security, Wi-Fi Security, Wireless Network Security, WLAN Security, Mobile Security
DEFINITION: Bluesnarfing is the theft of information from a wireless device through a Bluetooth connection. Bluetooth is a high-speed but very short-range wireless technology for exchanging data between desktop and mobile computers, personal digital assistants (PDAs), and other devices. By exploiting a vulnerability in the way Bluetooth is implemented on a mobile phone, an attacker can access information -- such  … 
Definition continues below.
Wireless Security Reports
251 - 252 of 252 Matches Previous Page  |  Next Page
3 Steps for Bullet-proof Wireless LAN Security & Management
sponsored by AirDefense Inc.
WHITE PAPER: As attacks on wireless technologies grow, the need for an effective wireless security plan becomes crucial. This white paper provides best practices on how to deploy secure wireless networks and protect against security threats and policy violations.
Posted: 12 May 2003 | Published: 31 Dec 2005

AirDefense Inc.

Wireless LAN Security - What Hackers Know That You Don't
sponsored by AirDefense Inc.
WHITE PAPER: What do hackers know that you don't? An understanding of the latest hacker techniques will help you take proactive steps to secure your wireless networks. This white paper examines methods, skills and tools hackers use to exploit vulnerabilities.
Posted: 07 Nov 2002 | Published: 31 Dec 2005

AirDefense Inc.
251 - 252 of 252 Matches Previous Page    9 10 11    Next Page
 
WIRELESS SECURITY DEFINITION (continued): …  as the user's calendar, contact list and e-mail and text messages -- without leaving any evidence of the attack. Other devices that use Bluetooth, such as laptop computers, may also be vulnerable, although to a lesser extent, by virtue of their more complex systems. Operating in invisible mode protects some devices, but others are vulnerable as long as Bluetooth is enabled.According to a ZDNet UK article, attackers are exploiting a problem with some implementations of the object exchange (OBEX) protocol, which is commonly used to exchange information between wireless devices. An attacker can synchronize … 
Wireless Security definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement