Wednesday, July 28, 2010

Monday, July 26, 2010

WPA2 vulnerability found

Perhaps it was only a matter of time. But wireless security researchers say they have uncovered a vulnerability in the WPA2 security protocol, which is the strongest form of Wi-Fi encryption and authentication currently standardized and available.

Malicious insiders can exploit the vulnerability, named "Hole 196" by the researcher who discovered it at wireless security company AirTight Networks. The moniker refers to the page of the IEEE 802.11 Standard (Revision, 2007) on which the vulnerability is buried. Read more...

Tuesday, July 20, 2010 - Certification & Training Resources for Technology Professionals - Certification & Training Resources for Technology Professionals

Arming Yourself Against Identity Theft

Identity theft is a very fast-growing problem, and you can become a victim if you're not careful. According to Privacy Rights Clearinghouse (, compromised personal information collected during data breaches includes Social Security numbers, account numbers, and driver's license numbers, all of which are useful to identity thieves. Since January 2005, 356,088,361 records containing sensitive personal information have been involved in security breaches in the U.S. This does not include incidents where identity theft was not reported. Read more...

Wednesday, July 14, 2010

“Millions” Of Home Routers Vulnerable To Web Hack « The Firewall -

Craig Heffner, a researcher with Maryland-based security consultancy Seismic, plans to release a software tool later this month that he says could be used on about half the existing models of home routers, including most Linksys, Dell, and Verizon Fios or DSL versions. Users who connect to the Internet through those devices and are tricked into visiting a page that an attacker has set up with Heffner's exploit could have their router hijacked and used to steal information or redirect the user's browsing. Read more...

Tuesday, July 6, 2010

PCWorld Reviewers' Favorite Downloads: June 2010 | PCWorld

PC World's reviewers spent June in a creative frenzy. They built bone animations, glammed up their photos, and made music like maestros. But there's more to art than that. Many masterpieces must be burned to Blu-Ray. And everybody needs utilities to organize all those files and open windows--not to mention keep data safe. Feeling a spark? Try out these programs and write your own review.

Friday, July 2, 2010

How to Stay Safe on Public Wi-Fi Networks

Starbucks is offering free Wi-Fi to all customers, at every location, starting today. Whether you're clicking connect on Starbucks' Wi-Fi or some other unsecured, public Wi-Fi network, here's how to stay safe and secure while surfing a public hotspot

Privacy: What Does Microsoft Know About You? --

Just about every software vendor or Web service collects information about its users. Some do it with more subtlety than others, but the fact is that there's hardly an application or Web site that doesn't gather some sort of intelligence about you every time you use it. Microsoft, of course, is no exception. From Windows Activation Technologies (WAT) to Bing, Microsoft stockpiles information on you even when you don't sign up for services such as Hotmail. But what does Microsoft know about you?