Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

6/30/2010
06:32 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

AirMagnet Launches AirWISE Community

Online resource center designed to foster education, collaboration and contribution around WLAN security and reliability topics

SUNNYVALE, Calif., June 29, 2010 - AirMagnet, part of Fluke Networks, today launched the AirWISE Community, an online resource center designed to foster education, collaboration and contribution around WLAN security and reliability topics, including current threats and new vulnerabilities/exploits, and intrusion prevention and security best practices.

Participants will gain access to unbiased information about the best practices for deploying, troubleshooting and securing enterprise WLANs via exclusive content and interactive forum discussions with leading experts. The forum section will allow community members to post questions that will be monitored and answered by some of the leading authorities on WLAN technology.

"The AirWISE Community Security Center will be a great resource for security professionals who want to collaborate or find out the latest information on WLAN security issues, standards or threats," said Chris Roeckl, vice president of marketing at AirMagnet. "As the community grows, we hope it becomes a forum for wireless security, helping to drive awareness and remediation of new threats."

The new community is located at http://www.airwisecommunity.com and is broken into specialized sections for security issues, WLAN best practices and educational tools. The site also contains a blog written by AirMagnet technical personnel, as well as contributed articles from other industry experts.

About AirMagnet

AirMagnet, now part of Fluke Networks, is the leader in security, performance and compliance solutions for wireless LANs. The company's innovative products include AirMagnet Enterprise, the leading 24x7 WLAN security and performance management solution, and AirMagnet WiFi Analyzer - which is known as the "de facto tool for wireless LAN troubleshooting and analysis." Other products provide WLAN site survey and design, RF interference detection, remote diagnostics, and the world's first voice over WiFi analysis solution. AirMagnet has more than 8,500 customers worldwide, including 75 of the Fortune 100. The company, based in Sunnyvale, Calif., has offices worldwide. For more information, visit www.AirMagnet.com.

2010 Fluke Corporation. All rights reserved. AirMagnet' and AirWISE' are registered trademarks, and the AirMagnet logo is a trademark of AirMagnet, now part of Fluke Networks. All other product names mentioned herein are trademarks or registered trademarks of their respective companies.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Edge-DRsplash-10-edge-articles
7 Old IT Things Every New InfoSec Pro Should Know
Joan Goodchild, Staff Editor,  4/20/2021
News
Cloud-Native Businesses Struggle With Security
Robert Lemos, Contributing Writer,  5/6/2021
Commentary
Defending Against Web Scraping Attacks
Rob Simon, Principal Security Consultant at TrustedSec,  5/7/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-31922
PUBLISHED: 2021-05-14
An HTTP Request Smuggling vulnerability in Pulse Secure Virtual Traffic Manager before 21.1 could allow an attacker to smuggle an HTTP request through an HTTP/2 Header. This vulnerability is resolved in 21.1, 20.3R1, 20.2R1, 20.1R2, 19.2R4, and 18.2R3.
CVE-2021-32051
PUBLISHED: 2021-05-14
Hexagon G!nius Auskunftsportal before 5.0.0.0 allows SQL injection via the GiPWorkflow/Service/DownloadPublicFile id parameter.
CVE-2021-32615
PUBLISHED: 2021-05-13
Piwigo 11.4.0 allows admin/user_list_backend.php order[0][dir] SQL Injection.
CVE-2021-33026
PUBLISHED: 2021-05-13
The Flask-Caching extension through 1.10.1 for Flask relies on Pickle for serialization, which may lead to remote code execution or local privilege escalation. If an attacker gains access to cache storage (e.g., filesystem, Memcached, Redis, etc.), they can construct a crafted payload, poison the ca...
CVE-2021-31876
PUBLISHED: 2021-05-13
Bitcoin Core 0.12.0 through 0.21.1 does not properly implement the replacement policy specified in BIP125, which makes it easier for attackers to trigger a loss of funds, or a denial of service attack against downstream projects such as Lightning network nodes. An unconfirmed child transaction with ...