wifi

Good afternoon everybody! I hope your day is going well.

Here are today's Interesting Information Security Bits from around the web.

  1. Be careful. It doesn't appear that it is very hard to turn you Windows 7 install into an wireless access point.
    Errata Security: Windows 7 includes soft-ap
    Tags: ( windows-7 wifi )
  2. Some good tips for making sure your WordPress install is as secure as possible.
    10 Ways To Secure Your WordPress Install
    Tags: ( wordpress )
  3. Offensive Security is setting up the next iteration of milw0rm.
    Leaders in Online Information Security Training >> Offensive Security Exploit Archive
    Tags: ( milw0rm offensive-security )

That's it for today. Have fun!

Subscribe to my RSS Feed if you enjoy these daily Interesting Bits posts.

Kevin

{ 0 comments }

Good afternoon everybody! I hope your day is going well.

Here are today's Interesting Information Security Bits from around the web.

  1. Ax0n has started a series on setting up an evil wifi attack type thing 🙂
    HiR Information Report: Evil WiFi Part 1: Jasager/Fonera Setup
    Tags: ( wifi hacking )
  2. Jennifer is pimping the Security B-Sides unconference that is occurring in Las Vegas around the same time as Blackhat. Cool stuff.
    Security Uncorked >> Security B-Sides Conference in Vegas
    Tags: ( conference security-b-sides )
  3. Zach "Quine" Lanier, the @securitytwits herder, is the next up in Raf's interview series.
    Digital Soapbox - Preaching Security to the Digital Masses: 31337 Spotlight: "Quine"
    Tags: ( interview )
  4. Here is the solution to the latest I Smell Packets challenge.
    Solution to Where in The World is Chris? << I Smell Packets
    Tags: ( challenge )

That's it for today. Have fun!

Subscribe to my RSS Feed if you enjoy these daily Interesting Bits posts.

Kevin

{ 0 comments }

Good afternoon everybody! I hope your day is going well.

Here are today's Interesting Information Security Bits from around the web.

  1. This might be very interesting. I have not read it yet, but it is going on the reading pile.
    ISACA Business Model for Information Security : Security Watch - Internet Security News: IT security, Business security, Computer security, Network security, and more
    Tags: ( security program )
  2. $1 trillion would pay for a log of security measures.
    Study: Cybercrime cost firms $1 trillion globally | Security - CNET News
    Tags: ( general )
  3. Ever had a packet capture from a wireless network and you couldn't read because your tool only understood ethernet? Wlan2eth to the rescue. A nifty tool that converts and WLAN pcap file into an ethernet pcap.
    New Tool: wlan2eth
    Tags: ( wifi )
  4. The Call for Papers is open for SecTor 2009. I have heard really good things about this conference. If you have an idea, why not contribute it?
    Security Experts Speaking Opportunities Black Hat White Hat Toronto Canada
    Tags: ( conferences cfp sector )
  5. I'm not promoting hacking, but this really is classic.
    Motorists warned of "Zombies Ahead" on hacked road sign | Graham Cluley's blog
    Tags: ( humor hacking )

That's it for today. Have fun!

Subscribe to my RSS Feed if you enjoy these daily Interesting Bits posts.

Kevin

{ 0 comments }