Database of wireless threats compiled

Dec 05, 2005

A Silicon Valley company said Monday it was making available the first public database of security threats aimed at wireless communications.

According to Network Chemistry, its WVE database will make it easier for the entire wireless industry to develop protections against the growing number of security threats designed to disrupt a variety of wireless communications products.

Officials at CWNP, the organization that certifies local area network system technicians, say the rapid growth of wireless communications in the business sector makes security a pressing need.

The project is sponsored by CWNP and the Center for Advanced Defense Studies in Washington. The WVE (wireless vulnerabilities and exploits) database itself may be accessed at wirelessve.org.

Copyright 2005 by United Press International

Explore further: New technology allows people to take a 'virtual field trip' to an aquarium tank

add to favorites email to friend print save as pdf

Related Stories

Body by smartphone

Jul 30, 2014

We love our smartphones. Since they marched out of the corporate world and into the hands of consumers about 10 years ago, we've relied more and more on our iPhone and Android devices to organize our schedules, ...

Robotic technology in the service of fashion

Feb 27, 2014

Research in robotics and automation being carried out in the Robotics Lab at UC3M is generating advances that go from the control of processes to mechatronics, passing through sensorial processing techniques, ...

Finding more space in spectrum

Jan 30, 2014

Radio and TV channels, mobile communications, GPS, and emergency communications are just a few examples of applications that occupy the airwaves. The radio spectrum is a finite resource, but demand for bandwidth ...

Recommended for you

California bans paparazzi drones

5 hours ago

California on Tuesday approved a law which will prevent paparazzi from using drones to take photos of celebrities, among a series of measures aimed at tightening protection of privacy.

User comments : 0