WiFi security is finally getting an upgrade after 14 years. The Wi-Fi Alliance has officially launched WPA3, the next-generation standard that promises to tackle many of the vulnerabilities that have persisted in wireless networking. Most notably, it brings individualized data encryption that should protect your data against eavesdropping from within the WiFi network. You’ll also get tougher password-based sign-ins through Simultaneous Authentication of Equals, a key establishment protocol that reduces the chances of someone guessing your password — even if it’s lousy.
PUBLIC WI-FI IS great. But it’s infuriating when your connection at the neighborhood coffee shop goes down minutes before deadline and the baristas have no clue what’s wrong.
If you’re like me, you’re an entrepreneur. We are so busy growing our businesses that we may not think about the risk of identity theft. After all, hackers go after big corporations. Right? Wrong! We are at greater risk of identity theft than large corporations. Yet, we have all seen company after company hacked putting Americans’ private information at risk.
If you’re been eyeing Google’s Chromecast Audio for your holiday shopping spree, Mountain View just added some new features to sweeten the deal. First, the $35 gadget now supports high-res audio with 96KHz/24 bit lossless playback. This means that if you have the proper audiophile-grade setup, you can expect to hear better than CD quality music coming through your speakers.
Stop me if you’ve heard this before: a secretive startup is promising to solve every problem you’ve ever had with wifi, from poor connections to ugly hardware or impossible software. This one might be worth a listen, though.
Your router might look like an impenetrable black box of internet mystery, but tweaking a few settings under the hood is easier than you might think. Here are some of the options you can reconfigure to get a faster wireless connection and keep unwelcome visitors off your network.
Our lives today depend largely on systems and infrastructure that is invisible—a hidden landscape of webs and waves that come from cell towers, routers, satellites, and more.