Wireless Wireless

What would a world completely without wires be like? In this Spotlight section we take a closer look at what is happening in the wireless space.

There are articles about research and initiatives which are on the horizon.

In this section you will also find stories about how companies are using wireless, such as trials being run using wireless technologies.

Review: Red-Alert PRO and Red Detect

Review: Red-Alert PRO and Red Detect

Red-M's Red-Alert Pro is a wireless intrusion detection probe that senses 802.11 a, b, g, and even Bluetooth activity simultaneously. It logs security threats and feeds the details to a Red Detect server if run in managed mode, or stores it if run standalone. Red-Alert Pro keeps track of connections between known and unknown devices, making an alert whenever a new unknown device is present and informing you of which device(s) the unknown entity is communicating with. If run in standalone mode, the security logs can be accessed via a convenient and intuitive web interface. If run in managed mode, the Red Detect server handles the logs.

Peter Stephenson,CeRNS, May 10 2005 12:00AM Security
Review: RFprotect

Review: RFprotect

This is a flexible, robust, very scalable and multi-purpose wireless security solution. It provides rogue detection, troubleshooting, vulnerability assessment, intrusion detection, performance management and usage accounting. It has a standard Windows GUI with an open source Firebird database that includes a secure, password-protected interface, and can be easily configured both for a small business or a large enterprise.

Peter Stephenson,CeRNS, May 10 2005 12:00AM Security
Review: Wireless Site Management

Review: Wireless Site Management

Computer Associates' Wireless Site Management 4.0 is a fully featured WLAN security and management suite. The software is mainly aimed at larger organizations, but it could be implemented for any company running a wireless network.

Peter Stephenson,CeRNS, May 10 2005 12:00AM Security
Review: AirDefense Enterprise

Review: AirDefense Enterprise

AirDefense Enterprise is one of those wireless-security products that integrates into the enterprise as an integral part of the overall network management scheme.

Peter Stephenson,CeRNS, May 9 2005 12:00AM Security
Review: BlueSecure

Review: BlueSecure

BlueSecure from Bluesocket is a leader in its field. Why? Because while most wireless security products are not able to detect anyone walking up with a wireless capable computer and connecting to their network, BlueSecure detects computers, access points, or any other type of wireless connection device.

Peter Stephenson,CeRNS, May 9 2005 12:00AM Security
Review: OmniPeek

Review: OmniPeek

This complete software offering can be installed on almost any system in the organization to capture data from the system's internal wireless card. But check the compatibility chart before ordering, as only a specific set of wireless cards are supported.

Peter Stephenson,CeRNS, May 9 2005 12:00AM Security
Wireless security (2005)

Wireless security (2005)

Rogue access points can blow your organization's security apart, but there are products out there that will not only find them out, but also offer integrated wireless management, says Peter Stephenson
Staff Writers May 9 2005 12:00AM Security
One third of London wireless networks insecure

One third of London wireless networks insecure

Hackers have a one-in-three chance of finding an unsecured wireless network in the City of London, according to new research.
René Millman Mar 10 2005 4:15PM Security
One third of London wireless networks

One third of London wireless networks

Hackers have a one-in-three chance of finding an unsecured wireless network in the City of London, according to new research.
René Millman Mar 10 2005 4:12PM Security
Worldwide PDA shipments grow: Gartner

Worldwide PDA shipments grow: Gartner

Worldwide PDA revenue hit a record US$4.3 billion in 2004, driven by an increased average selling price, according to preliminary results from Gartner research.
Vivienne Fisher Feb 17 2005 3:03PM Hardware
Why standards are important for wireless security

Why standards are important for wireless security

Industry standards play a critical role in R&D, product development and marketing initiatives which in turn help organizations meet their business objectives.
Staff Writers Feb 7 2005 11:33AM Security
“Evil Twin” allows hackers to phish for wireless data

“Evil Twin” allows hackers to phish for wireless data

Hackers are setting up fake wireless base stations and websites to trick laptop users into giving out sensitive information according to a cyber-crime expert.
René Millman Jan 20 2005 2:14PM Security
SkyNetGlobal listing in London

SkyNetGlobal listing in London

Sydney-based wireless access provider SkyNetGlobal expects to achieve a dual listing, trading on the alternative investment section of the London stock exchange as well as the ASX from 1 February.
Staff Writers Jan 18 2005 3:13PM Telco/ISP
Tallest building goes wireless

Tallest building goes wireless

The world's tallest building, set for launch in Taiwanese capital city Taipei this week, will boast mobile phone coverage throughout all 106 stories, including the lifts.

Staff Writers Dec 30 2004 9:46AM Telco/ISP
Wireless group in tsunami relief effort

Wireless group in tsunami relief effort

A world wireless association has announced plans for a relief effort within the wireless broadband industry for victims of this week's devastating South-East Asia tsunami.

Staff Writers Dec 30 2004 9:40AM Telco/ISP
Vic clinics get 86km wireless link

Vic clinics get 86km wireless link

MIMP has launched what it believes is the world’s longest commercial wireless broadband link, linking radiology centres in Victoria’s Ballarat and Geelong in one 86km hop.
Fleur Doidge Dec 14 2004 3:00PM Networking
Review: Wi-Foo: The Secrets of Wireless Hacking

Review: Wi-Foo: The Secrets of Wireless Hacking

Despite the names (Konstantin Gavrilenko, Andrei Mikhailovsky, Andrew Vladimirov), the three people who wrote this book are based in the UK and are the founders of an IT security company there by the name of Arhout. They have decided to impart gems of knowledge to us about wireless networks and how to kept hackers out. Or alternatively if you possess a degree of moral flexibility, you could use this book to learn about hacking into said networks.

René Millman Dec 2 2004 12:00AM Security
Understanding common wireless LAN attacks

Understanding common wireless LAN attacks

There is little doubt the enterprise Wireless LAN (WLAN) market is booming. Worldwide WLAN hardware revenue is expected to top $3.7bn USD in 2007 (Infonetics), with over 50% of enterprises deploying WLANs by 2006 (Meta Group).
Brian Mansfield Dec 1 2004 10:38AM Security
Lan 1 signs Motorola wireless

Lan 1 signs Motorola wireless

Sydney niche distributor Lan 1 has signed up to distribute Motorola’s Canopy product for wireless ISPs, carriers and enterprise customers.
Staff Writers Nov 30 2004 12:00AM Networking
Stealth wireless creates security nightmare

Stealth wireless creates security nightmare

Stealth implementation of remote access systems is creating a security nightmare, new surveys have revealed. Companies are failing to create adequate polices to govern the safe use of Blackberrys, laptops and smartphones, leaving holes through which systems can be compromised.
David Quainton Nov 16 2004 12:41PM Security

Log In

  |  Forgot your password?