WiFi KRACK: Take these four key steps to manage the risk and protect your network

2018-10-09T12:52:45+00:00

When the WPA2 vulnerability, better known as the WiFi KRACK was revealed late last year, what followed was a torrent of concerning headlines suggesting that all WiFi communications could be decrypted. Whilst it is vulnerability at the core of one of the most popular forms of WiFi network security, all is not as bad as some of the articles might lead you to believe.   We're going to take a realistic look at how this attack works and outline some important steps users and service providers can take to keep networks and devices safe.   WiFi KRACK: Four key steps to manage the risk and protect your network   What is a KRACK?   KRACK, meaning Key Reinstallation AttaCK, works by abusing a flaw found in the WPA2 implementation declared [...]

WiFi KRACK: Take these four key steps to manage the risk and protect your network2018-10-09T12:52:45+00:00

Top 5 Tools for Cross Platform Mobile Development

2018-10-09T11:25:44+00:00

    Mobile Application Development Series – Part 3   Welcome to part 3 of our 5-part series on mobile application development.   Part 1 looked at the essential breakdown of your mobile application development budget, and how to financially plan carefully for project success. And we examined priorities to consider when matching the right mobile application development company for your project in Part 2. Now, straight on to part 3 - and (in our humble opinion) the best tools around right now for cross platform mobile development...   Top 5 Tools for Cross Platform Mobile Development When those sudden moments of genius strike, you could be onto the next big thing – the new Angry Birds or Snapchat might be around the corner. But the main practicality in [...]

Top 5 Tools for Cross Platform Mobile Development2018-10-09T11:25:44+00:00