wifi
Exploring Cutting-Edge Browser Security with Vivek Ramachandran – Founder of SquareX
In this special episode of the Shared Security Podcast, host Tom Eston interviews Vivek Ramachandran, the founder of SquareX. Vivek shares his journey in WiFi security, recounting his introduction of the Cafe ...

Linux Fixes 5 Gaping Holes in Wi-Fi
Linux’s Wi-Fi code has some *nasty* bugs, which can be exploited simply by being near an attacker. They’re caused by our old friend: Memory-unsafe C code ...
How to protect a corporate Wi-Fi network
The importance of Wi-Fi both for providing various services to customers and employees and for managing and receiving data from technological facilities, coupled with the interoperability of IoT devices, is increasing every ...

Wireless (in)security in Canberra CBD
Due to the strict COVID-19 policies in Australia, the BSides Canberra hacker conference was back in mid-April 2021. My visit was a good excuse to take my pwnagotchi for a walk in ...
Keeping employee data safe – no matter where they may be
how to secure wifi for remote work, working from home securely, security home network, secure wifi network, remote work security risks, work from home security best practices The post Keeping employee data ...
Hacking Christmas Gifts: Artie Drawing Robot
If high-tech gadgets are on your holiday shopping list, it is worth taking a moment to think about the particular risks they may bring. Under the wrong circumstances, even an innocuous gift ...

Hacking Christmas Gifts: Putting IoT Under the Microscope
If high-tech gadgets are on your holiday shopping list, it is worth taking a moment to think about the particular risks they may bring. Under the wrong circumstances, even an innocuous gift ...

Wireless Pentesting Part 4 – Performing an Actual Wireless Pentest
In the previous article of this series, “Wireless Pentesting Part 3 – Common Wireless Attacks”, we discussed various scenarios to give you a better grasp of how wireless networks and clients can ...

Wireless Pentesting Part 3 – Common Wireless Attacks
In the previous article of this series, “Wireless Pentesting Part 2 – Building a WiFi Hacking Rig”, we discussed building a WiFi hacking rig. We covered the hardware, operating systems, and software ...
F5 BIG-IP Exploit, WiFi Router Security Updates, Password Reuse
In episode 129 for July 13th 2020: Impact of the F5-BIG-IP critical vulnerability, security updates and your WiFi router, and details about new research that shows how billions of compromised credentials are ...