About

Contact Us

Reach out for consulting inquiries, media contact, corrections, research collaboration, and partnership opportunities.

Enterprise WiFi Security Consulting

MalwareZero.org's research team offers discrete, professional WiFi security assessment services for enterprises, government agencies, and organizations with significant wireless attack surface. Our assessments are conducted by the same researchers who produce the content on this site — people who understand WiFi attacks at a deep technical level because they've documented and reproduced them in our lab.

Our Consulting Services

  • WiFi Security Assessment: Comprehensive testing of your organization's WiFi infrastructure — access points, controllers, client devices, and the surrounding network. We identify weaknesses before attackers do. Includes: access point vulnerability scanning, rogue AP detection, client isolation testing, WPA2/WPA3 handshake capture and cracking attempts, evil twin simulation, and WIPS (Wireless Intrusion Prevention System) validation.
  • Penetration Testing (WiFi Focus): Authorized penetration testing focused specifically on your wireless perimeter. We test whether your WiFi security controls would hold up against a determined adversary. Scope can be limited to WiFi only or include the network accessible from the WiFi segment.
  • WiFi Architecture Review: Review of your current WiFi design from a security perspective — encryption configuration, segmentation, BYOD policies, guest network design, and integration with your broader network security architecture.
  • WiFi Incident Response: If you've experienced a WiFi-related security incident, we can assist with forensic analysis, scope determination, attacker identification, and remediation guidance.
  • WiFi Security Training: Hands-on training for your security team covering WiFi attack techniques, detection methods, and defensive countermeasures. Delivered at your site or remotely.

Engagement Requirements

All consulting engagements require:

  • Written authorization from someone with legal authority over the systems in scope
  • A defined scope document with specific IP addresses, locations, and testing windows
  • Signed master service agreement and statement of work before testing begins
  • Mutual NDA

We do not conduct assessments without a signed agreement. We do not conduct "anonymous" or "off the books" assessments. We do not provide partial or preliminary findings before a formal engagement is in place.

Contact for Consulting

To inquire about a consulting engagement, email us at:

consulting [at] malwarezero.org

Please include:

  • Your organization name and a brief description of your WiFi environment
  • The type of assessment you're looking for
  • Approximate scope (number of locations, access points, or IP ranges)
  • Preferred timeline

We will respond within two business days to discuss whether we can help and provide a preliminary scope proposal.

Press and Media Contact

MalwareZero.org is available for media inquiries related to WiFi security, wireless attack techniques, and broader cybersecurity topics within our expertise. We're happy to provide expert commentary, background briefings, or on-record interviews for journalists, podcasters, documentary producers, and authors.

We particularly enjoy talking about:

  • The real-world risk profile of public WiFi attacks (vs. media hype)
  • How new WiFi vulnerabilities affect ordinary users
  • The gap between theoretical attacks and practical exploitation
  • The ethics and legal landscape of security research

We generally decline interview requests that ask us to demonstrate specific attack techniques for dramatic effect in ways that might be misused. We can explain attacks clearly without providing operational how-to content.

Press Contact

Media inquiries: press [at] malwarezero.org

Please include your publication/outlet, the story you're working on, and what you'd like to discuss. We typically respond within one business day for media inquiries.

Submitting Corrections and Suggested Content

We take accuracy seriously, but we also know we make mistakes. If you find an error in any of our content — a technical inaccuracy, an outdated reference, a broken link, a typo — we want to know.

We also actively solicit suggestions for new content. If there's a WiFi security topic you think we're missing, or a question you haven't seen answered clearly anywhere, let us know.

What to Include in a Correction Report

  • The URL of the article with the error
  • The specific claim or statement that is incorrect
  • What the correct information should be (with a source if available)
  • Your name and email (optional — we appreciate attribution if you'd like it, but anonymous corrections are also accepted)

What to Include in a Content Suggestion

  • The topic or question you'd like to see covered
  • Why it's relevant or important to you
  • Your background (so we can calibrate the appropriate depth level)
  • Any relevant sources or research you've already seen on the topic

Correction and suggestion email: corrections [at] malwarezero.org

Bug Reports for the Site

If you find a technical bug on MalwareZero.org — a broken link, a rendering issue, a JavaScript error, an accessibility problem — please report it. We maintain the site to the same standards we apply to our content.

Please include:

  • A description of the bug and what you expected to happen
  • The URL where the bug appeared
  • Your browser and version (or operating system and device type for mobile issues)
  • Steps to reproduce, if reproducible

Bug reports: bugs [at] malwarezero.org

Partnership Inquiries

We are open to partnerships with organizations that share our mission of improving WiFi security knowledge. Potential partnership types:

  • Security training partnerships: Organizations that provide cybersecurity training may partner with us to develop curriculum or co-produce educational content.
  • Research collaboration: Academic researchers, security vendors, and independent researchers interested in collaborating on WiFi security research can reach out to discuss potential projects.
  • Tool integration: Security tool developers whose tools are referenced on our site may request partnership for enhanced integration, documentation, or promotion.
  • Conference and event sponsorship: We occasionally sponsor or speak at security conferences. If you're organizing a conference and interested in having MalwareZero.org participate, we'd be happy to discuss it.

Partnership inquiries: partnerships [at] malwarezero.org

We are selective about partnerships. We don't accept partnerships that would compromise our editorial independence, that involve promoting products we don't believe in, or that would create conflicts of interest with our educational mission.

Educational Use Permissions

MalwareZero.org content is freely available for educational use. We support the use of our content in:

  • University and college cybersecurity courses
  • Professional security training programs
  • Corporate security awareness programs
  • CTF (Capture The Flag) competitions and security exercises
  • Security meetup and conference presentations

For educational use, you generally don't need to ask permission — just attribute the content to MalwareZero.org and link back to the original article. If you're unsure whether your use case qualifies, or if you need a formal license agreement (for example, for commercial training programs), contact us.

We do ask that you:

  • Attribute the content to MalwareZero.org with a visible link to the original article
  • Not present our content as your own original research
  • Not strip our legal disclaimers or safety notices when using our content in your materials
  • Contact us if you want to substantially republish or adapt our content (rather than just link to it)

Educational use inquiries: education [at] malwarezero.org

Response Time Expectations

We read every email that comes through our contact addresses. Here's what to expect:

  • Consulting inquiries: We respond within 2 business days with an initial reply. Detailed proposals typically take 3-5 business days after initial contact.
  • Media and press: We respond within 1 business day. For urgent media requests with tight deadlines, please indicate the deadline in your subject line.
  • Corrections: We review and respond to corrections within 5 business days. If a correction is validated, we implement it within 24-48 hours of confirmation.
  • Content suggestions: We review all suggestions and incorporate them into our editorial planning. We can't respond to every suggestion individually, but meaningful suggestions that align with our editorial mission are taken seriously.
  • Bug reports: We triage bug reports within 3 business days and aim to fix confirmed bugs within one release cycle (typically 1-2 weeks for minor fixes).
  • Partnership inquiries: Initial response within 5 business days.

Please note: We do not respond to inquiries about hacking "for hire," requests to hack specific individuals or organizations, or inquiries that appear to be testing whether we'll help with illegal activities. Such emails are not replied to.

PGP Key for Secure Communication

For sensitive communications — particularly consulting inquiries involving potentially sensitive organizational information, or communications with security researchers discussing potential vulnerabilities — we provide our PGP public key for encrypted communication.

-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v2

mz-contact@malwarezero.org



Key ID:      0xXXXXXXXXXXXX
Fingerprint: XXXX XXXX XXXX XXXX XXXX XXXX XXXX XXXX XXXX XXXX
Key Type:    RSA 4096
Created:     2024-01-15
Expires:     2027-01-15

Download: https://malwarezero.org/contact.asc
Key Server: keys.openpgp.org (search: malwarezero@proton.me)
-----END PGP PUBLIC KEY BLOCK-----

To verify the key, check the fingerprint independently through our official website or at our on-site key signing party at DEFCON (we attend annually — come find us at the Wireless Village). Don't trust keys sent to you via email without verification.

Secure tip: When sending sensitive consulting inquiries, we recommend encrypting with our PGP key and using a throwaway email account if you're concerned about your own email security. We understand that organizations inquiring about WiFi security assessments sometimes have legitimate reasons to use encrypted communication.

Office Location

MalwareZero.org is a distributed research organization. We do not maintain a public office for walk-in visits. Our researchers work remotely across multiple countries, which we believe provides both operational security and diverse perspective on the global WiFi security landscape.

For in-person meetings related to consulting engagements or research collaboration, we can arrange meetings in various locations depending on the engagement. Please inquire via the appropriate contact address.

For physical mail or courier deliveries (e.g., for legal document service):

Note: We do not accept unscheduled physical deliveries at our research locations. All physical mail must be pre-arranged.

If you need to send legal documents, please contact us first at legal [at] malwarezero.org to make arrangements.

What We Don't Do

To be clear about our boundaries, here is what MalwareZero.org does not do:

  • We do not hack WiFi networks for individuals or organizations without a formal, signed engagement agreement.
  • We do not provide "ethical hacking as a service" for personal matters (e.g., hacking a spouse's WiFi, hacking a former employer's network out of spite).
  • We do not provide pre-publication review of our articles to vendors or organizations mentioned in them (we independently verify; we don't negotiate accuracy).
  • We do not respond to legal threats from organizations unhappy with our coverage — we respond through legal counsel only.
  • We do not provide real-time incident response or emergency hacking services. If you're experiencing an active attack, contact CISA, your national CERT, or a managed security service provider (MSSP).