<img height="1" width="1" src="https://www.facebook.com/tr?id=3323484487762706&amp;ev=PageView&amp;noscript=1">

Blog | Tim Connell

Types of Denial of Service (DoS) Attacks and How We Detect Them

Denial of Service (DoS) attacks on wireless networks are almost impossible to stop. Some attacks ...
Tim Connell

Wi-Fi Security Standards and Protocols

On your access points, are you using at a minimum WPA2-PSK with CCMP encryption? Is TKIP encryption ...
Tim Connell

Correlating a Device MAC Address to the Type of Device

Typically, when a device successfully connects to a network, the only information the network needs ...
Tim Connell

Detecting Vulnerabilities on Your Wireless Access Points

The rapid advancement of computer technology brings many devices, appliances, and gadgets that ...
Tim Connell

How to Secure Your Home Network From Intruders

With the current digital transformation, today’s households feature a wide range of ...
Tim Connell

How to Secure Your Phone From Hackers

Mobile phones have gained mainstream popularity since hitting the market in the 90's. The mobile ...
Tim Connell
1 2