Securing headquarters, data centers, branch offices and mobile users isn’t easy - especially when organizations take a traditional approach toward networking infrastructure using firewalls, VPNs and proxies.
Securing headquarters, data centers, branch offices and mobile users isn’t easy - especially when organizations take a traditional approach toward networking infrastructure using firewalls, VPNs and proxies.
If you’ve been following the news, you may have seen the recent stories discussing the issue about “fake” apps appearing in the Windows Store. Over the past few weeks, efforts have been …
Over the past few years, I’ve read many articles that show the staggering growth of mobile devices mapped against a corresponding decline in PC sales. Why is this occurring? One might think …
In our last entry in this ongoing series about the threat model against mobile devices, we explored the techniques for an attacker to get on an otherwise protected wireless network. This week, I …
In the previous entry in this series, we talked about how better word lists and better rules led to a renaissance in breaking passphrases (including WPA/WPA2 passphrases). It made the guesses more …