eWeek content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More TORONTO—There are a lot of ways to hack a A security ...
TLS and 802.1x EAP protects the initial wireless authentication. The next vulnerable portion of the transaction, the WEP key exchange, is protected using TLS. The authentication phase of a standard ...
This short primer will provide a few guidelines to consider when choosing an Extensible Authentication Protocol (EAP) method, one element of the authentication component of your Wi-Fi security plan.
If the challenge of securing a wireless LAN wasn't already confusing enough, things have just gotten worse. The confusion started last month when the Wi-Fi Alliance changed the WPA and WPA2 standards ...
Currently, the Wi-Fi Alliance, which certifies wireless LAN products for interoperability, tests hardware components only. However, the multivendor consortium has said it will soon likely also certify ...
Organizations using port-based network access control (NAC) devices to contain wireless intruders may be less secure than they assume. Unless an organization is using the most secure WPA2-EAP ...
Last month, I covered the 802.11 wireless standard and the various options available for wireless networking. This time, let’s look at the principles of securing ...