Exploring Cutting-Edge Browser Security with Vivek Ramachandran – Founder of SquareX

In this special episode of the Shared Security Podcast, host Tom Eston interviews Vivek Ramachandran, the founder of SquareX. Vivek shares his journey in WiFi security, recounting his introduction of the Cafe ...
Linux Fixes 5 Gaping Holes in Wi-Fi

Linux Fixes 5 Gaping Holes in Wi-Fi

Linux’s Wi-Fi code has some *nasty* bugs, which can be exploited simply by being near an attacker. They’re caused by our old friend: Memory-unsafe C code ...
Security Boulevard

How to protect a corporate Wi-Fi network

The importance of Wi-Fi both for providing various services to customers and employees and for managing and receiving data from technological facilities, coupled with the interoperability of IoT devices, is increasing every ...
Wireless (in)security in Canberra CBD

Wireless (in)security in Canberra CBD

| | Raspberry Pi, security, wifi
Due to the strict COVID-19 policies in Australia, the BSides Canberra hacker conference was back in mid-April 2021. My visit was a good excuse to take my pwnagotchi for a walk in ...

Keeping employee data safe – no matter where they may be

how to secure wifi for remote work, working from home securely, security home network, secure wifi network, remote work security risks, work from home security best practices The post Keeping employee data ...

Hacking Christmas Gifts: Artie Drawing Robot

If high-tech gadgets are on your holiday shopping list, it is worth taking a moment to think about the particular risks they may bring. Under the wrong circumstances, even an innocuous gift ...
wifi microscope

Hacking Christmas Gifts: Putting IoT Under the Microscope

If high-tech gadgets are on your holiday shopping list, it is worth taking a moment to think about the particular risks they may bring. Under the wrong circumstances, even an innocuous gift ...
EH-Net - Wylie - Wireless Pentesting Part 4 – Performing an Actual Wireless Pentest

Wireless Pentesting Part 4 – Performing an Actual Wireless Pentest

In the previous article of this series, “Wireless Pentesting Part 3 – Common Wireless Attacks”, we discussed various scenarios to give you a better grasp of how wireless networks and clients can ...
EH-Net - Wylie - Wireless Pentesting Part 3 - Common Wireless Attacks

Wireless Pentesting Part 3 – Common Wireless Attacks

In the previous article of this series, “Wireless Pentesting Part 2 – Building a WiFi Hacking Rig”, we discussed building a WiFi hacking rig. We covered the hardware, operating systems, and software ...

F5 BIG-IP Exploit, WiFi Router Security Updates, Password Reuse

In episode 129 for July 13th 2020: Impact of the F5-BIG-IP critical vulnerability, security updates and your WiFi router, and details about new research that shows how billions of compromised credentials are ...