<img height="1" width="1" src="https://www.facebook.com/tr?id=3323484487762706&amp;ev=PageView&amp;noscript=1">

Blog | Corey Belanger (5)

Published OUI Vendor List

All MAC addresses should resolve to a list of known vendors, or at the very least indicate the type ...
Corey Belanger

Hackers Targeting Preferred Network Lists (PNLs)

SONAR detects new potentially fake access points posing as a common open networks being broadcast ...
Corey Belanger

What is Amazon Sidewalk and What Risks Does it Pose to Your Home Network?

Amazon Sidewalk went live June 8, 2021. What is the product about? Does it pose any dangers to your ...
Corey Belanger

Wi-Fi Hacking Devices

Setting up home and small business networks is relatively rudimentary and straightforward today. ...
Corey Belanger

What is Cyber Insurance? Is It Adequate Protection?

Is cyber insurance a worthy investment in securing an organization from attacks? This is a question ...
Corey Belanger

What Is WPS and Why Is It Dangerous?

Wi-Fi Protected Setup (WPS) is a functionality built into many wireless routers to make it easier ...
Corey Belanger