Skip Links

Wireless Management Research Center

Your source for wireless management news, opinion, product comparisons and reviews.

Wireless Management News
How to prepare for cloud-based enterprise mobility management
What’s the fastest, easiest, low-cost way for your organization to achieve multi-platform enterprise mobility management (EMM) without sacrificing...
Trojan program 'Neverquest' a new threat to online banking users, researchers say
A new Trojan program that targets users of online financial services has the potential to spread very quickly over the next few months, security...
Extreme starts anew after Enterasys buy
Now that Extreme Networks has closed its acquisition of Enterasys, it's time to focus on the task at hand as a company twice its previous size.
NSA reportedly compromised more than 50,000 networks worldwide
The U.S. National Security Agency reportedly hacked into over 50,000 computer networks around the world as part of its global intelligence gathering...
Cybercrime forum advertises financial malware that uses stealthy I2P communications
A new financial malware program that communicates with attackers over the I2P (Invisible Internet Project) anonymity network is for sale on a Russian...
Trojan program steals log-in credentials, other sensitive data from SAP client applications
A recently discovered malicious program steals log-in passwords and other sensitive information from SAP client applications and allows...
Hackers actively exploiting JBoss vulnerability to compromise servers, researchers say
Attackers are actively exploiting a known vulnerability to compromise JBoss Java EE application servers that expose the HTTP Invoker service to the...
Attackers used known exploit to steal customer log-in credentials, vBulletin maker says
The vBulletin.com forum was not compromised by exploiting a previously unknown vulnerability as a group of hackers claimed, according to vBulletin...
Hackers claim they used zero-day vulnerability to breach vBulletin support forum
A group of hackers claim to have exploited an undocumented vulnerability in the vBulletin Internet forum software in order to break into the...
Rise seen in use of Google service for mobile botnets
Mobile botnets are on the rise and cybercriminals are using the Google Cloud Messaging service as a conduit for sending data from command-and-control...
Google fixes Chrome vulnerabilities exploited at Pwn2Own contest
Google released emergency security updates for Chrome in order to patch critical vulnerabilities demonstrated Thursday by a security researcher at...
Microsoft Patch Tuesday advisories urge ditching old, weak crypto algorithms
Microsoft patched serious vulnerabilities Tuesday in Windows, Internet Explorer and Office, but also urged customers to stop using the aging RC4...
Banking malware infections rise to highest level since 2002
Malicious software aimed at stealing online banking credentials surged in the third quarter of this year to a level not seen since 2002, according to...
British spies reportedly spoofed LinkedIn, Slashdot to target network engineers
British intelligence agency Government Communications Headquarters (GCHQ) reportedly used spoofed LinkedIn and Slashdot pages to compromise the...
High-gain patch antennas boost Wi-Fi capacity for Georgia Tech
To boost its Wi-Fi capacity in packed lecture halls, Georgia Institute of Technology gave up trying to cram in more access points, with conventional...
New malware variant suggests cybercriminals targeting SAP users
A new variant of a Trojan program that targets online banking accounts also contains code to search if infected computers have SAP client...
Fake social media ID duped security-aware IT guys
Security experts used fake Facebook and LinkedIn profiles pretending to represent a smart, attractive young woman to penetrate the defenses of a U.S....
Open-source software projects need to improve vulnerability handling practices, researchers say
Many open-source software developers need to improve the way in which they handle vulnerability reports, according to researchers from security firm...
Mozilla releases 10 patches, five critical, for Firefox
Mozilla released 10 patches for three versions of its Firefox browser on Tuesday, five of which are considered critical and could be used to remotely...
Citrix streamlines mobile productivity with new XenMobile
In case you haven't been paying attention, the rules for IT adminsA have changed. Companies generally don't call the shots any more for which...