Implement WPA2 Enterprise Encryption on Your WLAN
WPA2 Enterprise encryption with 802.1X authentication provides the best Wi-Fi security for businesses, but it's not always easy to configure. Our guide will get you past some of the stumbling blocks.
Watch for Authentication Bypass Vulnerabilities
You wouldn't build a person-sized cat door into a bank vault, but when your Web app or management tool assumes perfect behavior from your users, you're setting yourself up for similar failure.
Wireshark's a Killer App for Packet Hunting
Network traffic analysis is the kind of detective work that that can really soak up a lot of your time and energy. Wireshark is one tool that can save you a lot of that time and energy, thanks to its sheer power and simplicity.
How Risky is Android Mobile OS Code?
The Android mobile OS has in excess of 300 software flaws, according to a commercial code analysis firm. Yet doesn't every OS have its imperfections?