7 Wi-Fi vulnerabilities beyond weak passwords

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World WAN Alert

Feb 28, 2017
Featured Image

5G reality check: Where is 3GPP on standardization?

Good progress is being made in the key standardization efforts around 5G, but there is still a long way to go with Phase 1 standardization. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

7 Wi-Fi vulnerabilities beyond weak passwords
Amid cyberattacks, ISPs try to clean up the internet
(From our archives) History's first prank phone call was way back in ... 1884?
Ethernet 2.5GBASE-T and 5GBASE-T grows, testing on tap from UNH lab
Cloud companies are eyeing cell services, Nokia CEO says
Wi-Fi expanding to indoor location services
(2015) Watching a ‘Swatting’ slowly unfold within sight of the Boston Marathon starting line
FCC rolls back net neutrality ISP transparency rules
VR-controlled robot demonstrates 5G ultra-low latency at Mobile World Congress

Video/Webcast: Level 3

The Journey to Hybrid IT

Cloud is not just a destination, but a business transformation. When organizations race to Hybrid IT, Level 3 finds there are some key considerations they may over look, such as they importance of their network, which can put their transformation at risk. This webcast discusses this journey. Read More

Thumbnail Image
INSIDER

7 Wi-Fi vulnerabilities beyond weak passwords

Using strong encryption and passwords is only the first step in protecting your wireless network. Make sure you’re not exposed in these other ways. Read More

Thumbnail Image

Amid cyberattacks, ISPs try to clean up the internet

If your computer’s been hacked, Dale Drew might actually know about it. His company, Level 3 Communications, is a major internet backbone provider and routinely on the lookout for cyberattacks on the network level. From what they can tell, there’s a staggering 178 million IP addresses out there associated with malicious activity. Read More

(From our archives) History's first prank phone call was way back in ... 1884?

Read More

Thumbnail Image

Ethernet 2.5GBASE-T and 5GBASE-T grows, testing on tap from UNH lab

The University of New Hampshire InterOperability Laboratory (UNH-IOL) said it would begin offering testing and standards conformance services 2.5GBASE-T and 5GBASE-T Ethernet products. The broad testing services safeguard that Ethernet products and services are interoperable and will help customers boost network speed up to five times without requiring cabling infrastructure changes. Read More

Thumbnail Image

Cloud companies are eyeing cell services, Nokia CEO says

Enterprises and cloud companies will start trying their hands at cellular this year, Nokia President and CEO Rajeev Suri predicts. “Enhanced reality” and events such as concerts may be where cloud giants first get into mobile services, Suri said at a Nokia event in Barcelona on the eve of Mobile World Congress. Read More

Thumbnail Image

Wi-Fi expanding to indoor location services

The Wi-Fi Alliance's Wi-Fi Certified Location delivers meter-level accuracy for indoor device location data. Read More

Thumbnail Image

(2015) Watching a ‘Swatting’ slowly unfold within sight of the Boston Marathon starting line

The instant a bystander told me what he had heard, I knew this police operation was almost certainly the result of a hoax known as Swatting. Read More

Thumbnail Image

FCC rolls back net neutrality ISP transparency rules

The U.S. Federal Communications Commission has voted to roll back some net neutrality regulations that require broadband providers to inform customers of their network management practices. Read More

Thumbnail Image

VR-controlled robot demonstrates 5G ultra-low latency at Mobile World Congress

Using a VR-controlled robot, Deutsche Telecom, SK Telecom and Ericsson demonstrate the capabilities of 5G’s ultra-low latency and how it differs from 4G. Read More

Research/Infographic: ITS Partners

10 Examples of Employee Behaviors in the Cloud That Can Increase Risk

Every CISO knows that cloud apps are being used by employees. Some are approved apps but most are not. What every CISO doesn't know is the full extent of the actions employees are taking in those cloud apps and how those actions introduce risk. We've summarized the top risky actions employees are taking in an infographic you should print and post on your door. Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

5 things to think about for industrial IoT readiness

11 low-tech, decidedly cool cars Read More

Most-Read Stories

1. Four mindblowing Ted Talks for techies
2. Apple Watch Series 3 Rumor Rollup: New display, more energy & WatchOS beta 32
3. Battle of the clouds: Amazon Web Services vs. Microsoft Azure vs. Google Cloud platform
4. Ransomware attacks targeted hundreds of MySQL databases
5. Stop using SHA1: It’s now completely unsafe
6. 19 free cloud storage options
7. Google cloud debuts Intel’s latest Skylake processors
8. iPhone 7 Plus catches fire and melts in crazy new video
9. Three technologies that could demolish slow internet
10. How Google reinvented security and eliminated the need for firewalls
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World WAN Alert as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.