While this is not strictly a security-related snippet, it might still be interesting curiosity for someone working on that field and having to deal with a hostile or just mad WiFi Access Point (AP)
Security researchers at the University of Liverpool, School of Electrical Engineering, Electronics and Computer Science have developed a proof-of-concept malware – dubbed Chameleon – that is capable
Watch Sophos bust three wireless security myths: Network name hiding and MAC address filtering is for safety, not for security. And never use WEP as your wireless encryption solution.
A couple of months back, I walked past a friend who was working furiously on her laptop. It was her red BackTrack wallpaper that caught my attention. Being curious, I proceeded to ask her opinion
WPA or WPA2 security protocol can be used to prevent hackers and other unauthorised people from accessing wireless networks or even viewing traffic sent over them, but only when end users choose