Today’s Core 1 CompTIA A+ Pop Quiz: It has to be around here somewhere
Today’s Core 1 CompTIA A+ Pop Quiz: It has to be around here somewhere Read More »
RFID and NFC have become common technologies on our mobile devices. In this video, you’ll learn about security concerns associated with RFID and NFC and what type of attacks might be associated with these technologies. << Previous Video: Wireless Jamming Next: Randomizing Cryptography >> RFID stands for Radio-Frequency Identification. And it’s a technology
RFID and NFC Attacks – SY0-601 CompTIA Security+ : 1.4 Read More »
A wireless network relies on a clear frequency spectrum for optimal operation. In this video, you’ll learn about different wireless jamming techniques and how to locate the source of the interference. << Previous Video: Wireless Disassociation Attacks Next: RFID and NFC Attacks >> Radio frequency jamming, or RF jamming, is a way for an attacker
Wireless Jamming – SY0-601 CompTIA Security+ : 1.4 Read More »
An encrypted wireless network may not stop all types of attacks. In this video, I’ll demonstrate a wireless disassociation attacks and you’ll learn how to prevent them. << Previous Video: Bluejacking and Bluesnarfing Next: Wireless Jamming >> Let’s say you’re using your wireless network and it’s working exactly the way you would expect, except suddenly
Wireless Disassociation Attacks – SY0-601 CompTIA Security+ : 1.4 Read More »
Bluetooth technology is now quite robust and secure, but it wasn’t always that way. In this video, you’ll learn about unwanted Bluejacking messages and how attackers were able to retrieve information from your phone with Bluesnarfing. << Previous Video: Rogue Access Points and Evil Twins Next: Wireless Disassociation Attacks >> Bluejacking is an attacker sending
Bluejacking and Bluesnarfing – SY0-601 CompTIA Security+ : 1.4 Read More »
An unwanted wireless access point can be a significant security concern. In this video, you’ll learn about rogue access points, evil twins, and how to prevent or limit the use these wireless technologies. << Previous Video: Other Application Attacks Next: Bluejacking and Bluesnarfing >> A rogue access point is an access point that has been
Rogue Access Points and Evil Twins – SY0-601 CompTIA Security+ : 1.4 Read More »