Enterprise WiFi Security Consulting
MalwareZero.org's research team offers discrete, professional WiFi security assessment services for enterprises, government agencies, and organizations with significant wireless attack surface. Our assessments are conducted by the same researchers who produce the content on this site — people who understand WiFi attacks at a deep technical level because they've documented and reproduced them in our lab.
Our Consulting Services
- WiFi Security Assessment: Comprehensive testing of your organization's WiFi infrastructure — access points, controllers, client devices, and the surrounding network. We identify weaknesses before attackers do. Includes: access point vulnerability scanning, rogue AP detection, client isolation testing, WPA2/WPA3 handshake capture and cracking attempts, evil twin simulation, and WIPS (Wireless Intrusion Prevention System) validation.
- Penetration Testing (WiFi Focus): Authorized penetration testing focused specifically on your wireless perimeter. We test whether your WiFi security controls would hold up against a determined adversary. Scope can be limited to WiFi only or include the network accessible from the WiFi segment.
- WiFi Architecture Review: Review of your current WiFi design from a security perspective — encryption configuration, segmentation, BYOD policies, guest network design, and integration with your broader network security architecture.
- WiFi Incident Response: If you've experienced a WiFi-related security incident, we can assist with forensic analysis, scope determination, attacker identification, and remediation guidance.
- WiFi Security Training: Hands-on training for your security team covering WiFi attack techniques, detection methods, and defensive countermeasures. Delivered at your site or remotely.
Engagement Requirements
All consulting engagements require:
- Written authorization from someone with legal authority over the systems in scope
- A defined scope document with specific IP addresses, locations, and testing windows
- Signed master service agreement and statement of work before testing begins
- Mutual NDA
We do not conduct assessments without a signed agreement. We do not conduct "anonymous" or "off the books" assessments. We do not provide partial or preliminary findings before a formal engagement is in place.
Contact for Consulting
To inquire about a consulting engagement, email us at:
consulting [at] malwarezero.org
Please include:
- Your organization name and a brief description of your WiFi environment
- The type of assessment you're looking for
- Approximate scope (number of locations, access points, or IP ranges)
- Preferred timeline
We will respond within two business days to discuss whether we can help and provide a preliminary scope proposal.
Press and Media Contact
MalwareZero.org is available for media inquiries related to WiFi security, wireless attack techniques, and broader cybersecurity topics within our expertise. We're happy to provide expert commentary, background briefings, or on-record interviews for journalists, podcasters, documentary producers, and authors.
We particularly enjoy talking about:
- The real-world risk profile of public WiFi attacks (vs. media hype)
- How new WiFi vulnerabilities affect ordinary users
- The gap between theoretical attacks and practical exploitation
- The ethics and legal landscape of security research
We generally decline interview requests that ask us to demonstrate specific attack techniques for dramatic effect in ways that might be misused. We can explain attacks clearly without providing operational how-to content.
Press Contact
Media inquiries: press [at] malwarezero.org
Please include your publication/outlet, the story you're working on, and what you'd like to discuss. We typically respond within one business day for media inquiries.
Submitting Corrections and Suggested Content
We take accuracy seriously, but we also know we make mistakes. If you find an error in any of our content — a technical inaccuracy, an outdated reference, a broken link, a typo — we want to know.
We also actively solicit suggestions for new content. If there's a WiFi security topic you think we're missing, or a question you haven't seen answered clearly anywhere, let us know.
What to Include in a Correction Report
- The URL of the article with the error
- The specific claim or statement that is incorrect
- What the correct information should be (with a source if available)
- Your name and email (optional — we appreciate attribution if you'd like it, but anonymous corrections are also accepted)
What to Include in a Content Suggestion
- The topic or question you'd like to see covered
- Why it's relevant or important to you
- Your background (so we can calibrate the appropriate depth level)
- Any relevant sources or research you've already seen on the topic
Correction and suggestion email: corrections [at] malwarezero.org
Bug Reports for the Site
If you find a technical bug on MalwareZero.org — a broken link, a rendering issue, a JavaScript error, an accessibility problem — please report it. We maintain the site to the same standards we apply to our content.
Please include:
- A description of the bug and what you expected to happen
- The URL where the bug appeared
- Your browser and version (or operating system and device type for mobile issues)
- Steps to reproduce, if reproducible
Bug reports: bugs [at] malwarezero.org
Partnership Inquiries
We are open to partnerships with organizations that share our mission of improving WiFi security knowledge. Potential partnership types:
- Security training partnerships: Organizations that provide cybersecurity training may partner with us to develop curriculum or co-produce educational content.
- Research collaboration: Academic researchers, security vendors, and independent researchers interested in collaborating on WiFi security research can reach out to discuss potential projects.
- Tool integration: Security tool developers whose tools are referenced on our site may request partnership for enhanced integration, documentation, or promotion.
- Conference and event sponsorship: We occasionally sponsor or speak at security conferences. If you're organizing a conference and interested in having MalwareZero.org participate, we'd be happy to discuss it.
Partnership inquiries: partnerships [at] malwarezero.org
We are selective about partnerships. We don't accept partnerships that would compromise our editorial independence, that involve promoting products we don't believe in, or that would create conflicts of interest with our educational mission.
Educational Use Permissions
MalwareZero.org content is freely available for educational use. We support the use of our content in:
- University and college cybersecurity courses
- Professional security training programs
- Corporate security awareness programs
- CTF (Capture The Flag) competitions and security exercises
- Security meetup and conference presentations
For educational use, you generally don't need to ask permission — just attribute the content to MalwareZero.org and link back to the original article. If you're unsure whether your use case qualifies, or if you need a formal license agreement (for example, for commercial training programs), contact us.
We do ask that you:
- Attribute the content to MalwareZero.org with a visible link to the original article
- Not present our content as your own original research
- Not strip our legal disclaimers or safety notices when using our content in your materials
- Contact us if you want to substantially republish or adapt our content (rather than just link to it)
Educational use inquiries: education [at] malwarezero.org
Response Time Expectations
We read every email that comes through our contact addresses. Here's what to expect:
- Consulting inquiries: We respond within 2 business days with an initial reply. Detailed proposals typically take 3-5 business days after initial contact.
- Media and press: We respond within 1 business day. For urgent media requests with tight deadlines, please indicate the deadline in your subject line.
- Corrections: We review and respond to corrections within 5 business days. If a correction is validated, we implement it within 24-48 hours of confirmation.
- Content suggestions: We review all suggestions and incorporate them into our editorial planning. We can't respond to every suggestion individually, but meaningful suggestions that align with our editorial mission are taken seriously.
- Bug reports: We triage bug reports within 3 business days and aim to fix confirmed bugs within one release cycle (typically 1-2 weeks for minor fixes).
- Partnership inquiries: Initial response within 5 business days.
Please note: We do not respond to inquiries about hacking "for hire," requests to hack specific individuals or organizations, or inquiries that appear to be testing whether we'll help with illegal activities. Such emails are not replied to.
PGP Key for Secure Communication
For sensitive communications — particularly consulting inquiries involving potentially sensitive organizational information, or communications with security researchers discussing potential vulnerabilities — we provide our PGP public key for encrypted communication.
-----BEGIN PGP PUBLIC KEY BLOCK----- Version: GnuPG v2 mz-contact@malwarezero.orgKey ID: 0xXXXXXXXXXXXX Fingerprint: XXXX XXXX XXXX XXXX XXXX XXXX XXXX XXXX XXXX XXXX Key Type: RSA 4096 Created: 2024-01-15 Expires: 2027-01-15 Download: https://malwarezero.org/contact.asc Key Server: keys.openpgp.org (search: malwarezero@proton.me) -----END PGP PUBLIC KEY BLOCK-----
To verify the key, check the fingerprint independently through our official website or at our on-site key signing party at DEFCON (we attend annually — come find us at the Wireless Village). Don't trust keys sent to you via email without verification.
Office Location
MalwareZero.org is a distributed research organization. We do not maintain a public office for walk-in visits. Our researchers work remotely across multiple countries, which we believe provides both operational security and diverse perspective on the global WiFi security landscape.
For in-person meetings related to consulting engagements or research collaboration, we can arrange meetings in various locations depending on the engagement. Please inquire via the appropriate contact address.
For physical mail or courier deliveries (e.g., for legal document service):
Note: We do not accept unscheduled physical deliveries at our research locations. All physical mail must be pre-arranged.
If you need to send legal documents, please contact us first at legal [at] malwarezero.org to make arrangements.
What We Don't Do
To be clear about our boundaries, here is what MalwareZero.org does not do:
- We do not hack WiFi networks for individuals or organizations without a formal, signed engagement agreement.
- We do not provide "ethical hacking as a service" for personal matters (e.g., hacking a spouse's WiFi, hacking a former employer's network out of spite).
- We do not provide pre-publication review of our articles to vendors or organizations mentioned in them (we independently verify; we don't negotiate accuracy).
- We do not respond to legal threats from organizations unhappy with our coverage — we respond through legal counsel only.
- We do not provide real-time incident response or emergency hacking services. If you're experiencing an active attack, contact CISA, your national CERT, or a managed security service provider (MSSP).