Deprecated: mysql_connect(): The mysql extension is deprecated and will be removed in the future: use mysqli or PDO instead in /home/a26f9f83/public_html/articles/includes/config.php on line 159
Wireless Network Security > NetSparsh - Viral Content you Love & Share

Wireless Network Security

Working from home has its advantages, including no commute, a more flexible work schedule and fresh coffee and home-cooked meals whenever you want.

But working from home while using a wireless local area network (WLAN) may lead to theft of sensitive information and hacker or virus infiltration unless proper measures are taken. As WLANs send information over radio waves, someone with a receiver in your area could be picking up the transmission, thus gaining access to your computer.

They could load viruses on to your laptop which could be transferred to the company's network when you go back to work.

Up to 75 per cent of WLAN users do not have standard security features installed, while 20 per cent are left completely open as default configurations are not secured, but made for the users to have their network up and running ASAP.

It is recommended that wireless router/access point setup be always done though a wired client.

Change default administrative password on wireless router/access point to a secured password.

Enable at least 128-bit WEP encryption on both card and access point. Change your WEP keys periodically. If equipment does not support at least 128-bit WEP encryption, consider replacing it.

Although there are security issues with WEP, it represents minimum level of security, and it should be enabled.

Change the default SSID on your router/access point to a hard to guess name. Setup your computer device to connect to this SSID by default.

Setup router/access point not to broadcast the SSID. The same SSID needs to be setup on the client side manually. This feature may not be available on all equipment.

Block anonymous Internet requests or pings.

On each computer having wireless network card, network connection properties should be configured to allow connection to Access Point Networks Only. Computer to Computer (peer to peer) Connection should not be allowed.

Enable MAC filtering. Deny association to wireless network for unspecified MAC addresses. Mac or Physical addresses are available through your computer device network connection setup and they are physically written on network cards. When adding new wireless cards / computer to the network, their MAC addresses should be registered with the router /access point.

Network router should have firewall features enabled and demilitarized zone (DMZ) feature disabled.

You can test your hardware and personal firewalls using Shields Up test available at http://www.grc.com

All computers should have a properly configured personal firewall in addition to a hardware firewall.

Update router/access point firmware when new versions become available.

Locate router/access point away from strangers so they cannot reset the router/access point to default settings.

Locate router/access point in the middle of the building rather than near windows to limit signal coverage outside the building.

While none of the measure suggested above provides full protection as counter measures exist, a collection of suggested measures will act as a deterrent against attacker when other insecure networks represent easier targets.

The author of this article ia a software developer, consultant and author of numerous books. Visit his site for more information about the Top Spyware Removal Software.

In The News:

This RSS feed URL is deprecated, please update. New URLs can be found in the footers at https://news.google.com/news

New York Times

No Passport or Ticket: How a Woman Evaded Airport Security and Flew to London
New York Times
After Ms. Hartman joined the security line and was screened by the T.S.A., she tried to board a flight to Connecticut around 2 p.m., attempting to conceal herself behind a passenger who was waiting in line, Ms. Simonton said. As Ms. Hartman tried to ...
How Marilyn Hartman Got Past O'Hare SecurityCBS Chicago
'Serial stowaway' arrested for 10th time after slipping past airport security, flies to LondonFox 2 Detroit
Notorious 'serial stowaway' pensioner evades airport security and flies from Chicago to London without a ticketEvening Standard

all 29 news articles »

Google's Advanced Protection Program Offers Security Options For High-Risk Users
EFF
Security is not a one-size-fits-all proposition, and features that are prohibitively inconvenient for some could be critical for others. For most users, standard account security settings options are sufficient protection against common threats. But ...


BBC News

Syria offensive: US seeks to address Turkey's 'legitimate' security concerns
BBC News
The US is willing to work with Turkey to address its "legitimate" security concerns in northern Syria, Secretary of State Rex Tillerson has said. He was speaking after Turkey's military incursion into northern Syria to fight the Kurdish YPG militia at ...
US Hopes to Work With Turkey on 'Security Zone' in SyriaU.S. News & World Report
US hopes to work with Turkey to create 'security zone' in Syria: TillersonDaily Sabah
Turkey has legitimate security concerns: MattisHurriyet Daily News

all 452 news articles »

ZDNet

After ignoring for months, Uber fixes two-factor bypass bug after all
ZDNet
Uber has fixed a security bug that could've allowed an attacker to hack into user accounts by bypassing two-factor authentication, after the ride-sharing company initially said the flaw wasn't a "particularly severe" issue. The company quietly issued a ...


Engadget

Uber security flaw compromised two-factor authentication
Engadget
Two-factor authentication only works if it's strictly enforced in software, and it sounds like Uber might have fallen short of that goal for a while. In a chat with ZDNet, security researcher Karan Saini has revealed a flaw in Uber's two-factor ...

and more »

NBCNews.com

Report: Afghan security forces committed 75 rights abuses, including child sex assault
NBCNews.com
The report from the Special Inspector General for Afghanistan Reconstruction (SIGAR), which was first released to Congress last year but made public Tuesday, says that at least seven of the violations were child sexual assault, but also says "the full ...

and more »

CNBC

Soldiers, snipers and security at Davos: Protecting the world's rich and powerful
CNBC
Ensuring the safety of more than 2,500 high-profile political, economic and business guests at an event is never easy; ensuring the safety of more than 70 heads of state and government is a nightmare. The World Economic Forum (WEF) has said security is ...

and more »

New York Times

Prison Guards in France Continue Strike Over Security and Pay
New York Times
PARIS — A labor strike by prison guards around France entered its second week on Monday, as the guards vented anger over their pay and dangerous working conditions, an issue that erupted into the open this month after a string of violent assaults by ...

and more »

Sun Sentinel

Security guard shot colleague in Hollywood in fight over gate lock, police say
Sun Sentinel
Andres Aviles, 26, drove to Mexico and flew to El Salvador where he was detained while trying to reach Nicaragua, police said. Tonya AlanezContact Reporter · Privacy Policy. The security guard accused of shooting his colleague during a shift change at ...
Security guard accused of shooting colleague gets caught in El SalvadorWPLG Local 10
Fugitive security guard fled Florida. His crime caught up with him in El Salvador.Miami Herald

all 5 news articles »

Fox News

US says it wants to help Indonesia provide maritime security
Fox News
JAKARTA, Indonesia – U.S. Defense Secretary Jim Mattis says the Trump administration wants to help Indonesia play a central role in maritime security in the Asia-Pacific region. Mattis spoke briefly to reporters Tuesday after meeting with his ...
US to work with Indonesia on maritime security, counter-terrorismThe Straits Times

all 168 news articles »
Google News

3 Steps to Ending Scams and Virus Problems

Watching how the traditional media covers the latest virus or... Read More

A Basic Introduction To Spyware

Spyware is the most troublesome software to appear on the... Read More

How To Prevent Spyware Attacking Your Computer

Spyware is software or hardware installed on a computer without... Read More

Data Security; Are Your Company Assets Really Secure?

Is your data secure? Think again. Securing data is unlike... Read More

Check Out That Privacy Policy

Before you enter your name, address or any other data... Read More

Delete Cookies: New-Age Diet or Common Sense Internet Security?

No, this article isn't about some new, lose-20-pounds-in-a-week, certified-by-some-tan-Southern-California-doctor diet.... Read More

8 Surefire Ways to Spot an E-Mail Identity Theft Scam!

The E-Mail Identity Theft Scam is running Rampant. These E-Mail... Read More

How Can Someone Get Private Information From My Computer?

From the "Ask Booster" column in the June 17, 2005... Read More

Beware of Imitations! Security, Internet Scams, and the African Real Estate Agenda

Fishing on the Internet has come a long way. However,... Read More

Are You Surfing Safe?

Ok, you've got a computer, and you get online. You... Read More

Preventing Online Identity Theft

Identity theft is one of the most common criminal acts... Read More

If You Steal It, They May Come!

Business on the internet is getting down right shameless. This... Read More

Identity Theft -- 10 Simple Ways to Protect Your Good Name!

Identity Theft is one of the most serious problems facing... Read More

Is the Internet Insecure Because of You?

Long gone are the days that we could feel secure... Read More

Burning Bridges is Bad, But Firewalls are Good

When you signed up for that ultra-fast DSL or Cable... Read More

Viruses and Worms, Protection from Disaster

Virus damage estimated at $55 billion in 2003. "SINGAPORE -... Read More

Spyware Symptoms

Spyware symptoms happen when your computer gets bogged down with... Read More

Ransom Trojan Uses Cryptography for Malicious Purpose

Every day millions of people go online to find information,... Read More

How to Fight Spyware

If you are wondering how to fight spyware for safe... Read More

Internet Shopping - How Safe Is It?

Millions of people make purchases online, but many people are... Read More

Network Security 101

As more people are logging onto the Internet everyday, Network... Read More

Temporary Internet Files - the Good, the Bad, and the Ugly

A little bit of time invested into learning about internet... Read More

Five Excellent Indie Encryption And Security Solutions You Have Not Heard About

1. Geek Superhero http://www.deprice.com/geeksuperhero.htmGeek Superhero watches your computer for changes,... Read More

Phishing, Fraudulent, and Malicious Websites

Whether we like it or not, we are all living... Read More

Dialing Up a Scam: Avoiding the Auto-Dialer Virus

For many, the daily walk to the mailbox evokes mixed... Read More