Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Wi-Fi Security: Cracking WPA With CPUs, GPUs, And The Cloud
Tom's Hardware ^ | August 15, 2011 | Andrew Ku

Posted on 08/15/2011 2:37:51 PM PDT by decimon

Is your network safe? Almost all of us prefer the convenience of Wi-Fi over the hassle of a wired connection. But what does that mean for security? Our tests tell the whole story. We go from password cracking on the desktop to hacking in the cloud.

We hear about security breaches with such increasing frequency that it's easy to assume the security world is losing its battle to protect our privacy. The idea that our information is safe is what enables so many online products and services; without it, life online would be so very different than it is today. And yet, there are plenty of examples where someone (or a group of someones) circumvents the security that even large companies put in place, compromising our identities and shaking our confidence to the core.

Understandably, then, we're interested in security, and how our behaviors and hardware can help improve it. It's not just the headache of replacing a credit card or choosing a new password when a breach happens that irks us. Rather, it's that feeling of violation when you log into your banking account and discover that someone spent funds out of it all day.

(Excerpt) Read more at tomshardware.com ...


TOPICS: Computers/Internet
KEYWORDS: cloud; internet; internetsecurity; wifi; wifisecurity; wpa
Navigation: use the links below to view more comments.
first previous 1-2021-22 last
To: ShadowAce

Thanks for the ping.


21 posted on 08/16/2011 7:29:33 AM PDT by GOPJ (One ring to rule them/one ring to find them/one ring to tax them/and in indebtedness bind them.)
[ Post Reply | Private Reply | To 17 | View Replies]

To: Truth29
or uses a credit card over the Internet is also at risk.

We have one card just for transactions via the 'net. It has a very low limit on it so if it gets clipped, damage is limited.

22 posted on 08/16/2011 1:19:21 PM PDT by Bloody Sam Roberts (Deploy. Dominate. Disappear.)
[ Post Reply | Private Reply | To 6 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-22 last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson