Apple patches iPhone Broadcom wi-fi bug; Samsung Galaxy may be affected too
Apple races out a patch for a iOS devices that likely also affects Samsung's Galaxy S7 and a number of other Android smartphones too.
Apple races out a patch for a iOS devices that likely also affects Samsung's Galaxy S7 and a number of other Android smartphones too.
Tablets and smartphones, which employees are bringing into work in "Bring Your Own Device" (BYOD) style, are leading IT managers to ask security questions, starting with whether they should sort out corporate mobile apps and data from personal ones. It's all encouraged a spate of security start-ups to come up with their own answers, and highlighted here are a few that have recently hung out a shingle for mobile security. But it's not just mobile spurring the creation of young security firms out to change the world.
Ellen Messmer | 10 Jul | Read more
Issues recommendations, noting existing 'vulnerabilities ... that could directly impact medical devices or hospital network operations'
Antone Gonsalves | 14 Jun | Read more
Darryl Boyett asked if his home WiFi connection, which uses WPA2 protection, is safe enough for online banking.
Lincoln Spector | 22 Nov | Read more
If you operate a wireless network for your home or business, it's important to ward it against opportunistic hackers seeking to steal your data or hijack your Wi-Fi for their own nefarious purposes. We spoke to Steven Andrés, CTO of security consulting firm Special Ops Security, to learn about the best ways to lock down your Wi-Fi. To get started, you'll need to log in to your router's administrative console by typing the router's IP address into your Web browser's address bar. Most routers use a common address like 192.168.1.1, though alternatives like 192.168.0.1 and 192.168.2.1 are also common. Check the manual that came with your router to determine the correct IP address; if you've lost your manual, you can usually find the appropriate IP address on the manufacturer's website.
Alex Wawro | 12 Nov | Read more
You may already know the basics of Internet security and keeping your personal data private while browsing the Web: Use a firewall, don't open attachments you aren't expecting, and never follow links from strangers. But what about your smartphone? The ease with which security researcher Georgia Weidman was able to infect Android phones with her custom botnet during the 2011 ShmooCon security conference suggests that anyone concerned about the privacy of the personal data stored on their smartphone should think twice before downloading dubious or otherwise untrustworthy apps.
Alex Wawro | 05 Mar | Read more
As the need for mobility has grown in the enterprise, so have the security risks. While solutions have been developed to address specific security problems, there needs to be a holistic approach to WLAN security that leverages the security infrastructure of the wireline enterprise network.
Sunil Cherian | 15 May | Read more