TENAFLY, N.J. – Wireless cameras, RFID key cards, keyboards, cordless phones, just about every wireless technology that isn?t light- or sound-based will attract a hoard of researchers (and attackers) looking at ways to exploit them. Are you prepared?

It is now known that your car?s GPS, toaster and medical devices are vulnerable to attack. For the most part, built without protection in place, many of these devices are now being retrofitted with security. But did you know that your WiFi devices likely are just as vulnerable?

Enter Software Defined Radio (SDR). Frequency hopping, modulation schemes and other signal processing happen in software rather than specialized hardware. It is the ultimate in convenience for eavesdroppers seeking confidential information.

Click on Securitycurrent.Com