Last month, I covered the 802.11 wireless standard and the various options available for wireless networking. This time, let’s look at the principles of securing ...
eWeek content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More TORONTO—There are a lot of ways to hack a A security ...
TLS and 802.1x EAP protects the initial wireless authentication. The next vulnerable portion of the transaction, the WEP key exchange, is protected using TLS. The authentication phase of a standard ...