For almost 18 months starting in 2005, attackers used wireless networks at TJX and other retail chains to steal credit card data. The vulnerabilities were not an isolated instance: Subsequent research ...
Internet Security Systems this week announced it has expanded its security consulting practice to tackle vulnerabilities that may be associated with wireless LAN products from vendors that include ...
A “scary” vulnerability in Broadcom Wi-Fi chipsets could lead to long-term instability and affect how an organization operates.
Vulnerability Scanning vs Penetration Testing: What’s the Difference? Your email has been sent Many IT security terms have proved challenging to understand due to their similarities and contextual ...
As any network and security manager knows, new vulnerabilities are constantly being discovered and threats against corporate networks are getting increasingly sophisticated. Proactively scanning for ...
Companies have increased the cadence of application-security testing — with triple the number of applications scanned and 20 times more scans per application — compared to a decade ago, according to ...
Along with the potential performance and coverage benefits of 802.11n come a few new security risks, says industry security guru Joshua Wright. Wright presented a Webinar last week that outlined ...