
Ever heard of an evil twin AP? An evil twin AP is like a rogue access point. The attacker creates a fake wireless AP to lure users into thinking it’s a trusted wireless…
Read more
Today, Wireless Network has become more and more present in open area or large companies and security enhancement is needed to control authentication and confidentiality. The 802.11 Working Group introduced the 802.11i amendment as…
Read more
Most of the time, you’re probably okay if you accidentally hit “Connect” on Free Public WiFi, as you’re just trying to connect to a machine that’s unwittingly rebroadcasting its own inability to connect….
Read more
WPA/WPA2 vastly improves the security of wireless networks; however, the extra protection comes at the price of added complexity to the protocol. Although WPA was developed with security in mind, it does have its own…
Read more