Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

6/30/2010
06:32 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

AirMagnet Launches AirWISE Community

Online resource center designed to foster education, collaboration and contribution around WLAN security and reliability topics

SUNNYVALE, Calif., June 29, 2010 - AirMagnet, part of Fluke Networks, today launched the AirWISE Community, an online resource center designed to foster education, collaboration and contribution around WLAN security and reliability topics, including current threats and new vulnerabilities/exploits, and intrusion prevention and security best practices.

Participants will gain access to unbiased information about the best practices for deploying, troubleshooting and securing enterprise WLANs via exclusive content and interactive forum discussions with leading experts. The forum section will allow community members to post questions that will be monitored and answered by some of the leading authorities on WLAN technology.

"The AirWISE Community Security Center will be a great resource for security professionals who want to collaborate or find out the latest information on WLAN security issues, standards or threats," said Chris Roeckl, vice president of marketing at AirMagnet. "As the community grows, we hope it becomes a forum for wireless security, helping to drive awareness and remediation of new threats."

The new community is located at http://www.airwisecommunity.com and is broken into specialized sections for security issues, WLAN best practices and educational tools. The site also contains a blog written by AirMagnet technical personnel, as well as contributed articles from other industry experts.

About AirMagnet

AirMagnet, now part of Fluke Networks, is the leader in security, performance and compliance solutions for wireless LANs. The company's innovative products include AirMagnet Enterprise, the leading 24x7 WLAN security and performance management solution, and AirMagnet WiFi Analyzer - which is known as the "de facto tool for wireless LAN troubleshooting and analysis." Other products provide WLAN site survey and design, RF interference detection, remote diagnostics, and the world's first voice over WiFi analysis solution. AirMagnet has more than 8,500 customers worldwide, including 75 of the Fortune 100. The company, based in Sunnyvale, Calif., has offices worldwide. For more information, visit www.AirMagnet.com.

2010 Fluke Corporation. All rights reserved. AirMagnet' and AirWISE' are registered trademarks, and the AirMagnet logo is a trademark of AirMagnet, now part of Fluke Networks. All other product names mentioned herein are trademarks or registered trademarks of their respective companies.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Why Cyber-Risk Is a C-Suite Issue
Marc Wilczek, Digital Strategist & CIO Advisor,  11/12/2019
The Cold Truth about Cyber Insurance
Chris Kennedy, CISO & VP Customer Success, AttackIQ,  11/7/2019
Black Hat Q&A: Hacking a '90s Sports Car
Black Hat Staff, ,  11/7/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-5230
PUBLISHED: 2019-11-13
P20 Pro, P20, Mate RS smartphones with versions earlier than Charlotte-AL00A 9.1.0.321(C00E320R1P1T8), versions earlier than Emily-AL00A 9.1.0.321(C00E320R1P1T8), versions earlier than NEO-AL00D NEO-AL00 9.1.0.321(C786E320R1P1T8) have an improper validation vulnerability. The system does not perform...
CVE-2019-5231
PUBLISHED: 2019-11-13
P30 smartphones with versions earlier than ELLE-AL00B 9.1.0.186(C00E180R2P1) have an improper authorization vulnerability. The software incorrectly performs an authorization check when a user attempts to perform certain action. Successful exploit could allow the attacker to update a crafted package.
CVE-2019-5233
PUBLISHED: 2019-11-13
Huawei smartphones with versions earlier than Taurus-AL00B 10.0.0.41(SP2C00E41R3P2) have an improper authentication vulnerability. Successful exploitation may cause the attacker to access specific components.
CVE-2019-5246
PUBLISHED: 2019-11-13
Smartphones with software of ELLE-AL00B 9.1.0.109(C00E106R1P21), 9.1.0.113(C00E110R1P21), 9.1.0.125(C00E120R1P21), 9.1.0.135(C00E130R1P21), 9.1.0.153(C00E150R1P21), 9.1.0.155(C00E150R1P21), 9.1.0.162(C00E160R2P1) have an insufficient verification vulnerability. The system does not verify certain par...
CVE-2010-4177
PUBLISHED: 2019-11-12
mysql-gui-tools (mysql-query-browser and mysql-admin) before 5.0r14+openSUSE-2.3 exposes the password of a user connected to the MySQL server in clear text form via the list of running processes.