
There are many advantages to using wireless networking. However, this kind of technology comes with a host of threats and vulnerabilities that hackers can take advantage of. Since information is sent over the air via radio frequencies, it is easier... Read more

Wireless networks pose a threat to all who use them. Wireless networks lack the safety associated with having one’s communications securely transmitted inside physical cabling. With wireless communications, the air is the transmission medium and that medium is accessible to... Read more

In this article we’ll be setting up a Fake Access Point. As you know, Access Points or routers transmit their WiFi network(s) with a SSID. Some of these names can be very common. Any device such as a phone or... Read more

It is crucial for people to learn how to protect their wireless networks to ensure their confidential information does not fall into the wrong hands. This article will give a brief introduction to securing a personal wireless network and how... Read more

Connecting to the Internet wirelessly has become ubiquitous. Many people have wireless networks in their home, and in addition, many corporations are setting up wireless networks as well. They do it because it’s much less expensive to set up a... Read more

There are many advantages to using wireless networking. However, this kind of technology comes with a host of threats and vulnerabilities that hackers can take advantage of. Since information is sent over the air via radio frequencies, it is easier... Read more

In the good old days, Internet access was a privilege of the few and many used to try getting access by all means possible. A common way to achieve unauthorized access was war dialing, or calling through long lists of... Read more

Wireless networks are accessible to anyone within the router’s transmission radius. This makes them vulnerable to many wireless attacks. There is no debate about how much easier WiFi has made our lives. Now we can connect to the internet at... Read more

The term ‘wireless network‘ refers to two or more computers communicating using standard network rules or protocols, but without the use of cabling to connect the computers together. Instead, the computers use wireless radio signals to send information from one... Read more

Wireless networks that are run in the home, office, cafes, and pretty much anywhere are also avenues for hacking. Back in the day, WiFi networks were kept open. That means if you had any device that could connect to the... Read more

One of the most challenging and interesting recent trends is integration of computing equipment and devices by using wireless communication technologies. Resulting networks, known as wireless computing systems, enhance functionality of computing equipment by freeing communication from location constraints of... Read more

Most people ask themselves whether they can be tracked over the Internet by having their MAC Address or IP address detected by others. It’s true that IP addresses are no longer secret. It’s a main part of the Internet communications... Read more

MAC address filtering allows only a set list of hardware devices connect. Every device will have a unique MAC address. However, using a sniffer the MAC address of a valid client is easily found. Most wireless cards allow their MAC... Read more