For broadcom wifi issues, follow the instructions here. This site provides step by step instructions for identifying the card and a list of supported cards and what drivers to use for each model. The technology behind Trusteer Apex does not rely on threat signatures, or on so-called “whitelists” of good applications. And you can think …