Google Introduces DNS-over-HTTP/3 in Android

Google this week announced the rollout of DNS-over-HTTP/3 (DoH3) for Android 11 and newer devices.
An encrypted DNS protocol, DoH3 is expected to provide performance and safety improvements compared to alternatives, mainly through the QUIC transport la… Continue reading Google Introduces DNS-over-HTTP/3 in Android

Wireless Segmentation Concepts: When, Why, and How

Required for security and compliance, segmentation is a major architecture element of a secure wireless network. Here’s an overview of when, why, and how to properly segment wireless including Wi-Fi, IoT, and private cellular.

MORE > Click the titl… Continue reading Wireless Segmentation Concepts: When, Why, and How

Adobe Plugs 46 Security Flaws on Patch Tuesday

Adobe’s security response team has pushed out a massive batch of patches to cover at least 46 vulnerabilities in a wide range of enterprise-facing software products.
As part of its scheduled Patch Tuesday release for June, Adobe warned of “critical” co… Continue reading Adobe Plugs 46 Security Flaws on Patch Tuesday

Researchers: Wi-Fi Probe Requests Expose User Data

A group of academic researchers from the University of Hamburg in Germany has discovered that mobile devices leak identifying information about their owners via Wi-Fi probe requests.
Mobile devices use these probe requests to receive information about … Continue reading Researchers: Wi-Fi Probe Requests Expose User Data

Researcher Shows How Tesla Key Card Feature Can Be Abused to Steal Cars

A researcher has shown how a key card feature introduced by Tesla last year could be abused to add an unauthorized key that allows an attacker to open and start a vehicle.
The research was conducted by Martin Herfurt, an Austria-based member of the Tri… Continue reading Researcher Shows How Tesla Key Card Feature Can Be Abused to Steal Cars

How to design architecture for enterprise wireless security [Free book excerpt]

You can access content from Chapter 5 “Planning and Design for Secure Wireless”, and learn my 5-phase design methodology for wireless network and security.

MORE > Click the title to read the full article.

Continue reading How to design architecture for enterprise wireless security [Free book excerpt]