<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>NetStumbler</title>
	<atom:link href="http://www.netstumbler.com/category/rsa/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.netstumbler.com</link>
	<description>The award-winning wireless networking tool and the best source for your daily Wi-Fi, WiMAX, 3G and VoIP news.</description>
	<lastBuildDate>Fri, 19 Sep 2014 17:52:12 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.5.1</generator>
		<item>
		<title>RSA: Attendees Drop Ball On Wi-Fi Security</title>
		<link>http://www.netstumbler.com/2007/02/20/rsa-attendees-drop-ball-on-wi-fi-security/</link>
		<comments>http://www.netstumbler.com/2007/02/20/rsa-attendees-drop-ball-on-wi-fi-security/#comments</comments>
		<pubDate>Tue, 20 Feb 2007 14:17:00 +0000</pubDate>
		<dc:creator>Eliza Villarino</dc:creator>
				<category><![CDATA[RSA]]></category>
		<category><![CDATA[Security]]></category>

		<guid isPermaLink="false">http://www.netstumbler.com:8080/?p=67</guid>
		<description><![CDATA[Over half of the wireless LAN devices at the RSA Conference were found to be prone to security attacks &#8211; particularly &#8220;Evil Twin&#8221; and &#8220;zero day&#8221; &#8211; during two days of WLAN traffic scanning by wireless security vendor AirDefense. The first type happens when a victim wirelessly connects to a laptop or handheld device masquerading [...]]]></description>
				<content:encoded><![CDATA[<p>Over half of the wireless LAN devices at the RSA Conference were found to be prone to security attacks &#8211; particularly &#8220;Evil Twin&#8221; and &#8220;zero day&#8221; &#8211; during two days of WLAN traffic scanning by wireless security vendor AirDefense. The first type happens when a victim wirelessly connects to a laptop or handheld device masquerading as a legitimate access point or hot spot. The other involves preying on newly discovered software flaws in applications like Internet Explorer, which have neither been repaired nor provided with a patch.</p>
<p>On Day 1, AirDefense saw vulnerabilities in 347, or 56 percent, of 623 devices. Day 2 testing had a similar result, with 481 devices of 847, or 57 percent, having been found to be vulnerable. AirDefense Chief Security Officer Richard Rushing clarified that the conference network was not the cause of the vulnerabilities, and even commended it for being as secured if not &#8220;better than most standard corporate networks.&#8221;<br />
Via [<a href="http://www.computerworld.com/action/article.do?command=viewArticleBasic&#038;taxonomyName=mobile_and_wireless&#038;articleId=9011100&#038;taxonomyId=15">computerworld.com</a>]</p>
]]></content:encoded>
			<wfw:commentRss>http://www.netstumbler.com/2007/02/20/rsa-attendees-drop-ball-on-wi-fi-security/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Security Overhaul For Wireless Networks</title>
		<link>http://www.netstumbler.com/2001/12/29/security-overhaul-for-wireless-networks/</link>
		<comments>http://www.netstumbler.com/2001/12/29/security-overhaul-for-wireless-networks/#comments</comments>
		<pubDate>Sat, 29 Dec 2001 23:08:00 +0000</pubDate>
		<dc:creator>Wayne Slavin</dc:creator>
				<category><![CDATA[RSA]]></category>
		<category><![CDATA[Security]]></category>

		<guid isPermaLink="false">http://www.netstumbler.com:8080/?p=2856</guid>
		<description><![CDATA[The security of wireless networks is getting a make-over in an attempt to secure them from drive-by hacking attacks. Via [news.bbc.co.uk]]]></description>
				<content:encoded><![CDATA[<p>The security of wireless networks is getting a make-over in an attempt to secure them from drive-by hacking attacks.<br />
Via [<a href="http://news.bbc.co.uk/1/hi/sci/tech/1723171.stm">news.bbc.co.uk</a>]</p>
]]></content:encoded>
			<wfw:commentRss>http://www.netstumbler.com/2001/12/29/security-overhaul-for-wireless-networks/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
