Attack of the Drones - Part 2
When speaking of drone attacks, most people think first about risky encounters between remote-controlled drones and commercial aircraft (http://www.flukenetworks.com/node/215376) or drones used for malicious airborne snooping and pen-testing (http://www.flukenetworks.com/node/175608). However, businesses exploring commercial drone applications face a completely different challenge: keeping those remote-controlled business drones safe.
Earlier this month at DEFCON, attendees learned about two new drone attacks.
Attack of the Drones - Part 1
In February, we pondered whether 2015 would be the year of the drones:
http://www.flukenetworks.com/blog/airwi ... ear-drones
Six months later, the answer appears to be a resounding “yes.” Near-miss encounters between commercial aircraft and remote-controlled drones continue to make headlines at an alarming rate.
Fly safe this summer
As the availability of in-flight Wi-Fi grows, so does the potential for mid-air wireless attacks.
According to RouteHappy, flyers now have at least some chance of getting in-flight Wi-Fi on 24 percent of flights worldwide. Within the US, that likelihood spikes to 66 percent – including all of Virgin America and over half of Delta, JetBlue, and Southwest flights. Want to increase your odds of getting online aloft? Choose a flight served by Boeing equipment.
Wireless picks for BlackHat USA 2015 and DEF CON 23
Automotive hacking over wireless seems to be creating quite a stir. Check out this Wired video demo by Charlie Miller and Chris Valasek, who gave a briefing about this at BlackHat 2015:
http://www.wired.com/2015/07/hackers-re ... p-highway/
Wireless picks for BlackHat USA 2015 and DEF CON 23
Each summer, white hats, grey hats, and black hats rendezvous in Las Vegas for that well-known pair of industry events: Black Hat and DEF CON. In keeping with tradition, this month’s AirWise blog provides a short-list of briefings and presentation of particular interest to those responsible for securing wireless networks.
For Wi-Fi hacking demos, go to DEF CON
Avoiding Honeypot APs: Who do you trust?
While rigorously validating server certificates is key to avoiding Honeypot APs and other man-in-the-middle attacks that may follow, this advice begs the question: How do you know which servers to trust?
Can WPA2-Enterprise stop Honeypot AP attacks?
Numerous demonstrations have proven that users easily fall prey to open Honeypot (aka Evil Twin) APs. For example, an experiment conducted recently in London tricked 250 unsuspecting Wi-Fi clients into connecting to a fake public hotspot AP in just 30 minutes, with 33 of those victims actively using the honeypot to carry out web searches and send email, often exposing POP3 passwords (see http://freedome.f-secure.com).
What WLAN admins can learn from Starbucks
Earlier this week, reports surfaced about payment fraud attacks experienced by users of the Starbucks mobile app. It does not appear that reported attacks were caused by a Starbucks payment systems breach or mobile app code flaw. In fact, in a May 13th news post, Starbucks flatly stated “News reports that the Starbucks mobile app has been hacked are false.” (https://news.starbucks.com/news/starbuc ... t-security)
Don’t fall into the “No iOS Zone”
In this week’s RSA 2015 session entitled “Mobile Vulnerabilities: From Data Breach to Complete Shutdown,” the co-founders of Skycure took aim at iOS and its increasing number of network security vulnerabilities – notably, an iOS SSL certificate parsing bug capable of crashing almost any app, demonstrated here:
Are you vulnerable to the FREAK attack?
Last month, researchers in France discovered yet another gaping hole in SSL, dubbed the FREAK attack. FREAK is a downgrade vulnerability that can be exploited by a man-in-the-middle attacker to neutralize the security otherwise afforded by SSL and its younger better-looking sibling TLS.
RE: Looking in all the right places for wireless intruders
For those interested in learning more about License-Assisted Access (LAA) and its potential impact on wireless LANs, here’s an excerpt from the Wi-Fi Alliance statement on LAA:
Looking in all the right places for wireless intruders
Channel scanning is the cornerstone of Wi-Fi intrusion prevention. RF visibility is absolutely critical for everything from basic rogue detection to effective threat containment. If your organization is not comprehensively scanning all the right frequencies, you could be overlooking intruders hiding in plain sight. Like a home security system that monitors locked doors but not wide-open windows, a “secure” WLAN that scans for rogues on just a few popular channels is vulnerable to attack.
“Good Enough” Isn’t Good Enough Anymore: AirMagnet Enterprise v10.9 and the Need for Comprehensive Wireless Security Solutions
2014 was a busy year for wireless security, and not in a good way. The total number of cyber security incidents increased by 48% between 2013 and 2014 for a total of 42.8 million, according to PwC’s Global State of Security Survey. Back in 2010, the number was only 9.4 million. These attacks cost the global economy up to $575 billion annually as estimated by the Center for Strategic and International Studies research.
WLPC Attendees: AirMagnet Trials are Being Extended!
Those of you who recently attended the wirelessLAN Professionals conference know you received a free trial of AirMagnet Survey Pro and AirMagent WiFi Analyzer Pro included in your attendee bags. We usually keep our trials to a 30 days or less, but what we heard from you is that simply wasn’t enough time for you to really dive into the software. That matters to us. And we listened.
When you read the words ‘heat map’ what is immediately conjured to mind? For most people it’s a colorful map showing AP signal strengths throughout a deployment. There is no doubt signal strength is a valuable tool for validating a network will function as intended. However there is another very important metric that is often ignored when performing a site survey: Interference.
Would you recognize a Pineapple Evil Twin?
Over the years, it's grown much easier to launch Evil Twin attacks.
Will 2015 be the year of the drones?
After a year of increasingly frequent and potentially dangerous encounters between drones and airplanes, fire fighters, and even the White House, the FAA yesterday finally proposed a new set of rules governing non-recreational use of small unmanned aircraft systems (UAS).
According the FAA’s Proposed Part 107, drones must weigh less than 55 pounds, flown in the daylight, controlled by visual line of sight, and remain close enough at all times to be seen by the operator.
Improving Site Surveys
Two people head out to the same site to perform a site survey, they’re both using the same software, and yet they get significantly different results. We’d all like to think that data from a site survey is by definition reliable, but it’s not. So what happened? Choice of adapter, choice of survey (active vs. passive), even the paths the individuals walked can have large impact on the results. If you’re not following accepted best practices and collecting the right information during a survey, your results will be unreliable.
The Wi-Fi (R)evolution continues with Wi-Fi Direct
Roughly fifteen years ago, the wireless LAN industry was focused on delivering basic interoperable wireless connectivity at just 11 Mbps. Today, Wi-Fi CERTIFIED unit sales are set to pass the ten billion unit mark, composed of products that deliver gigabit data rates along with a slew of advanced certifications that make wireless more secure, usable, and accessible.
Using WPA2 to avoid data breach headlines
When most people hear “data breach” they think about lost laptops, server break-ins, or malware-based attacks. But according to a new survey by Spiceworks, commissioned by Certes Networks, lax network security and traffic segmentation played a crucial role in data breaches reported in 2013-2014. A few of this survey’s top findings included:
* Encryption for data in motion is highly fragmented, with 3 out of 4 companies using at least two methods – most often SSL-protected web traffic, followed by SSL-based VPNs.
Perfecting Passpoint secure roaming
In 2012, the Wi-Fi Alliance launched as secure seamless wireless roaming certification program dubbed Passpoint. This program was designed to overcome public hotspot challenges – notably, the security threats posed by open hotspots and the configuration barriers that impede mobile device hotspot roaming. The latter is of special importance to cellular and fixed broadband network operators that are anxious to offload mobile voice and data traffic onto less expensive Wi-Fi access networks.
DarkHotel: What Hospitality WLAN Operators Should Know
Operators responsible for securing hospitality networks have long worked to reduce fundamental guest Wi-Fi vulnerabilities and raise awareness about more sophisticated threats. From blocking client-to-client traffic to adding Hotspot 2.0, hospitality network operators can play a big part in helping to protect guests. This week, new research published by Kaspersky demonstrates how these valiant efforts can still fall short – specifically, by failing to stop an Advanced Persistent Threat (APT) dubbed DarkHotel.
Five Myths about Wireless Security
In our connected world, wireless security threats – which can lead to identity theft or the loss of proprietary information – have become all too common. As National Cyber Security Awareness Month winds down, here are five common myths about wireless security that deserve our attention and action:
Poodle preys on open WiFi hotspot users
WiFi Pineapple Detected: How to Combat this Sly Hacking Tool
Picture this. You’re monitoring a wireless network at a busy trade show. People are everywhere, browsing between booths. Everything is going smoothly until your wireless intrusion prevention system alerts you to an unauthorized access point spoofing your network’s SSID.
But with a large area to cover and limited information on the threat, you’re looking for the proverbial needle in the haystack.
Keep your mitts off my MiFi – why rogue policies matter
Last Friday, the FCC announced that it had fined Marriott $600,000 for “intentionally interfering with and disabling Wi-Fi networks” at the Gaylord Opryland Hotel in Nashville, Tennessee. The FCC’s ruling stems from a guest’s complaint in March 2013 that his mobile hotspot could not maintain a connection in the convention center’s ballroom. Specifically:
Hey, what’s that new MAC address? It’s just iOS 8
As iOS 8 starts appearing in WLANs just about everywhere today, one change that many WLAN admins will notice is a flurry of new probing Wi-Fi clients. In fact, those aren’t new Wi-Fi clients at all – they’re just iOS 8 devices now randomizing the MAC addresses carried in Probe Requests and Probe Responses.
Is your WLAN ready for the bigger, faster iPhone 6?
Apple this week announced the next generation of its flagship smartphone. The iPhone 6 and iPhone 6 Plus offer larger screens, thinner bodies, faster processors, better cameras, and embedded support for Apple’s new NFC-enabled ApplyPay system. While these features may grab headlines, many users will be just as thankful – if not more so – for the core wireless improvements found in these new iPhones.
Specifically, the iPhone 6 and iPhone 6 Plus include:
Don’t let this Wi-Fi exploit bug your BlackBerry
In the ever-changing smartphone landscape, BlackBerry phones have long been security darlings – built for enterprise administration and chocked full of lock-down capabilities, including a natively-secure transport protocol that’s impervious to common public Wi-Fi risks. But this relatively robust foundation doesn’t render the BlackBerry OS or BlackBerry Enterprise Server immune to Wi-Fi borne attack.
Planning for 11ac Wave Two and Beyond
As the Wi-Fi Alliance celebrates the one-year anniversary of 802.11ac certification, one naturally starts thinking about what the future will bring. Today, more than 670 entries appear on the Alliance’s list of Wi-Fi CERTIFIED ac products, including over 250 smartphones and 170 enterprise APs. ABI predicts that by 2015, 45% of all consumer Wi-Fi APs will support 11ac.
If a Drone Is Lurking in Your Airspace, DTU Has You Covered
Over the last couple years, drones have been capturing news headlines. From wars overseas, to airborne Amazon deliveries, to the most recent trend of drones flying through 4th of July firework celebrations (which was very cool), drones are simultaneously capturing our imagination and infringing on our personal space at alarming rates.
Last week, tourists atop the Seattle Space Needle were buzzed by a drone hovering over the observation deck, 520 feet above street level. The drone then flew home to its operator, perched inside a nearby hotel room window. When police officers arrived, the drone’s operator – a visiting Amazon.com employee – played back footage shot by the drone, showing tourists waving from the observation deck.
Say Hello to AirCheck™ Wi-Fi Tester for Android™ and AirCheck™ Handheld 3.0
Today’s wireless networks support far more than just the basic applications of a few years ago. High speeds, reliability, and “anywhere – everywhere” service are now table stakes. They are to business-critical applications, transactions, and employee productivity. And as wireless networks have evolved, so have the engineers and technicians that plan, deploy and troubleshoot the networks.
Wireless Hacks at DEFCON 22
Wireless security professionals know that safeguarding a network requires thinking like an attacker. One great place to gain this perspective is DEF CON, slated for August 7-10, 2014.
New Wireless Attacks at BlackHat 2014
WiFi professionals looking for the latest in wireless vulnerabilities and attacks may want to check out BlackHat USA 2014 on August 2-7 in Las Vegas. This annual hack-fest brings together researchers from around the world anxious to share new attack targets, vectors, and exploits. This year’s briefings take aim at cars, point of sale devices, cloud services, mobile devices, and the increasingly wireless fabric that makes all of this communication possible.
Stay “Healthy” with AirMagnet Mobile Tools
When it comes to healthcare, keeping patients healthy is no longer in the hands of just doctors and nurses. Network technicians also have a critical job. In fact, healthcare is one industry where Wi-Fi plays a mission-critical role for applications that patients and their doctors rely on—fusion pumps, glucose monitors, wireless scanners and the list goes on.
Cupid takes a shot at WiFi devices
Heartbleed’s fallout continues, as researchers continue to find and exploit OpenSSL vulnerabilities. At the end of May, Luis Grangeia announced Cupid, a pair of Heartbleed exploits that target WiFi devices.
Like Heartbleed, Cupid uses a malicious TLS Heartbeat packet to exploit an OpenSSL vulnerability, retrieving a 64 KB chunk of the victim’s memory. However, instead of sending the TLS Heartbeat over TCP, Cupid sends that malicious packet over EAP – the Extensible Authentication Protocol used by 802.1X for enterprise WLAN access control.
Denial of Service: Virtual Carrier by Node
As enterprise wireless networks have matured, effective threat detection and prevention have grown indispensible. But WLANs constantly change in composition and location, requiring nimble defenses that can rapidly recognize and prevent emerging threats.
Defeating Data Breaches with WIPS
Verizon recently released its latest data breach investigations report, after reviewing more than 63,000 security incidents reported in 2013, resulting in 1,300 confirmed data breaches.
What you need to know about Heartbleed
Vendors and site administrators are scrambling to close the gaping hole opened by Heartbleed, a remotely-exploitable bug in the OpenSSL crypto library widely used to enable TLS sessions. But Heartbleed doesn’t just affect web servers.
New AirCheck™ Wi-Fi Tester for Windows® and AirCheck™ Wi-Fi Tester for Android™ Offers Greater Platform Choice for Technicians
Any good technician knows the value of having the right tool at the right time. They also know transporting a toolbox overflowing with testing equipment isn’t always practical. The good news is Fluke Networks can help. We just released new AirCheck Wi-Fi Tester solutions that run on Windows or Android devices, which means frontline technicians can now use the platform of their choice when troubleshooting basic Wi-Fi issues.
Stopping Rotten Apple Man-in-the-Middle Attacks
If you are an apple iOS user, take a few minutes right now to install last week’s patch to fix a glaring SSL certifiate handling error that left over 700 million iPhones, iPads, Apple TVs and Macs vulnerable to Man-in-the-Middle (MitM) attack.
Mobility Takes the Center Stage at Mobile World Congress 2014
This week is Mobile World Congress (MWC) in Barcelona, Spain and all eyes are on the latest mobile trends and emerging technologies and services. If you’re wondering what’s next for the mobile industry, just take a look at what’s on the agenda at MWC.
For starters, “mobile” is no longer synonymous with 3G/4G cellular. From Bring-Your-Own-Device (BYOD) to mobile video, Near Field Communication to Wi-Fi voice offload, mobile payments to M2M industrial wireless, the MWC conference explores the entire fast-growing ecosystem spawned by mobility.
Hot Spot 2.0 Crawling Along
The Wi-Fi Alliance has been quietly growing its list of Passpoint certified Wi-Fi products for over a year, topping 200 certifications to date. In fact, many contemporary smartphones now implement the WFA's Hotspot 2.0 spec for seamless, secure hotspot roaming, including Apple's iPhone 5S and Samsung's Galaxy S4.
Up the Speed: 5 Tips for Deploying 802.11ac
The bring-your-own-device (BYOD) phenomenon is growing rapidly and creating capacity issues for enterprises that must now support more devices than ever. In addition, networks are already under strain from bandwidth-hungry applications like video and audio streaming. Given all the performance demands, anything that improves the capacity and end-user experience of wireless networks is likely to be embraced by network planners.
Detect and Protect from Cellular and Wi-Fi Security Threats with AirMagnet Enterprise
With the networking world increasingly moving into the wireless realm, security becomes an utmost concern for protected entities including government agencies and enterprises. New methods meant to breach security and jam cellular airways pose a real risk for organizations that rely on a closed network to maintain business processes. In and around sensitive locations, there is a growing need to monitor and detect cellular usage and many entities require continuous visibility into the presence of cellular devices.
How Does PCI DSS Version 3 Impact Wireless Networks?
The PCI Security Standards Council, a forum to develop payment card security standards, published version 3.0of the PCI Data Security Standard (PCI DSS) and Payment Application Data Security Standard (PA-DSS). The new version will become effective on Jan. 1, 2014. Version 2 will remain in effect until Dec. 31, 2014, to give organizations adequate time to comply with the new standards.
The Industry’s First 802.11ac Wireless Deployment Tool – Fluke Networks’ AirMagnet Survey PRO 8.6
Faster is better. It’s a truth that’s been fully embraced by the networking industry since the beginning. After all, we can’t even stomach a web page that takes more than five seconds to load, or 10 second file share access. As our network connectivity expectations continue to rise, and as wireless plays an ever increasing role with ubiquitous access to key business applications, the ability to quickly deploy new wireless technologies is key.
Wireless Integrity in the Hospital
In a recent AirWISE blog post, we talked about the complex wireless environment that often exists in a busy modern hospital.
In Texas, even the COWs are wireless
Memorial Hermann health system is an example of the old adage that everything is bigger in Texas.
New iPhones and iOS 7: What’s it all mean for WLAN Administrators?
Apple recently announced that it sold more than 9 million new iPhone 5s and 5c models in just the first 3 days of their availability while nearly 200 million existing users upgraded to iOS 7 (which runs on iPads and iPod touch devices as well as iPhones) in just 72 hours.
New Threat Signature to Combat SSID Fuzzing Attack
Recently an issue was announced from a third party website that identified an issue with the Core Text rendering engine used by Apple in their iOS and OSX platforms. A malicious string of Unicode characters can cause the application that used Core Text to crash. This included Safari, Chrome browser, and the message application.
Say goodbye to bulky, expensive carrier offload tools and hello to AirMagnet Spectrum ES™
Did you know that more than a third of global mobile data traffic was offloaded to small cells in the last year? And that the volume is expected to grow to nearly 50% over the next few years?
Intrusion Detection for Wireless Compliance
Government regulations and industry standards often require businesses to take measures to track, prevent and report network intrusion. A wireless intrusion detection system (IDS) monitors and records WLAN events and analyzes them for possible security incidents. An intrusion prevention system (IPS) has all the features of an IDS, but with additional functions designed to stop an identified attack. The tool you choose will depend on your business needs and security infrastructure.
Karma is a …Errr, What We Learned at BlackHat 2013
BlackHat is always a fantastic and enlightening event, and this year was no different. Your faithful Fluke Networks team was in the Sponsor Hall showing off AirMagnet Enterprise, our comprehensive wireless intrusion and prevention and detection (WIPS/WIDS) solution.
Top Briefings for Wireless Security Professionals at BlackHat 2013
Every summer, hackers flock to Las Vegas, NV, to learn about new vulnerabilities and exploits, and this year’s show is right around the corner, starting July 27 and going through August 1. As in years past, BlackHat speakers are expected to introduce a few new wireless hacks. Here’s a quick preview of briefings that may be of interest to wireless network admins and users:
Wi-Fi Certified 802.11ac is Here (And If You’re Not Ready, You’re Playing Catch-Up)
After one of the biggest tech build-ups since IPv6, the Wi-Fi Alliance finally launched its Wi-Fi CERTIFIED ac program in mid-June. Wi-Fi CERTIFIED ac products interoperate with each other and older Wi-Fi products in the 5 GHz band, delivering higher data rates (up to 1.3 Gbps), higher capacity, lower latency and better battery life due to reduced power consumption.
Securing BYO Devices Extends Beyond the Enterprise – It Starts at Home
For employees who bring their own device to work (BYOD), compliance with company policy should start at home. If your employees use a home wireless network to access the corporate network, you need ensure their home network is secure for all their activity, whether they are at work or play.
Snooping is more than a public telephone threat: How to prevent Vo-Fi attacks
Public telephone snooping isn’t the only call vulnerability out there. Voice over IP calls can be snooped over wireless networks, leaving corporate and personal calls vulnerable without appropriate precautions and tools. Any unencrypted traffic sent over Wi-Fi can be easily captured for later replay.
Reflections on Interop Las Vegas 2013: The WLAN Life Cycle, AP Problems and IT Best Practices
Last month, I attended Interop Las Vegas to speak about Wireless LAN Testing, Benchmarking and Verification with a panel of wireless industry experts, including analyst Craig Mathias. Our discussion was well attended by a variety of eager, lively network professionals with active, dynamic debate and discussions.
Model Any Wireless Environment Across Multiple Floors with the New Release of AirMagnet Survey (8.5)
Wireless networks are becoming ubiquitous. We connect wirelessly at our homes, offices, hotels, cafes and airports – pretty much everywhere. Wireless environment are also very dynamic: the RF (radio frequency) environment can change, new users may need to be supported, more devices may need to be supported (Bring Your Own Device; BYOD) or access points (APs) may need to be upgraded to the latest 802.11 technology. Unfortunately when these challenges emerge, many struggle with proper planning to address these problems.
Step Aside BYOD, There’s a Bigger, Badder WLAN Challenge on the Horizon: Network Traffic Planning
While IT admins are losing sleep over smartphone and tablet (in)security, there’s a bigger, badder challenge on the horizon: wireless network traffic planning.
Seven Steps to Creating a Common Sense BYOD Compliance Policy
Today users not only bring themselves to work, but also their devices. Bring Your Own Device (BYOD) to work programs make for complex security policies and strategies for compliance. As with most things, a little common sense can go a long way in reducing the risk of threats and managing components where specific technologies can be applied.
Putting Customer Data at Risk is Never In Style: How a Major Department Store Chain Uses AirMagnet Enterprise for Full Wi-Fi Visibility
Often the problems that need solving the most are the ones right in front of you. This holds true for one major department store chain that found from deploying AirMagnet Enterprise, they had hazardous Wi-Fi threats hidden in plain site.
AirMagnet Enterprise Wins Network Products Guide Bronze Award for Mobility and Wireless Solution
Fluke Networks’ AirMagnet team works hard to deliver the industry’s premier overlay wireless intrusion detection and prevention system (WIPS/WIDS) – for companies that have the most stringent security requirements. And, we’re excited to say, the industry has recognized us for our efforts.
How to ensure Wi-Fi networks are ready for Cisco Location Services: Fluke Networks’ AirMagnet Survey PRO First to Use Real-World Data
Image this situation: Your IT department selects a new service to keep your organization better organized, more secure, and better equipped for emergencies. Your department invests ample time into deploying the new service, diligently working to meet specific requirements, and triple checking work completed. And then, to your surprise the service doesn't act quite as it should.
Unfortunately for some Cisco Location Services (CLS) customers, this can be a reality because of a lack of using real-world data when designing the network.
Does Wi-Fi Network Compliance Equal Corporate Data Security?
If a network is compliant with regulations, does that mean it’s secure? Unfortunately for both IT professionals and businesses, no it doesn’t. Why? Compliance is not security, but security can be compliant - with a set of requirements and guidelines that ensure data is confidential to authorized users, has integrity, has not been changed or modified, and is available on demand.
Three Steps for Making BYO Access Points a Company Benefit, Not an IT Risk
As I discussed in my last blog post, Bring Your Own Access Points (BYO APs) are quickly growing both in public use and in the workplace. In fact, according to a February 2013 survey conducted by Smith Micro, 62 percent of smartphone users use their handset’s personal hotspot feature. Market analyst firm TechNavio expects the Global Mobile Hotspot Router market to grow 34 percent annually between 2012 and 2016, driven partially by 4G bandwidth.
Bring Your Own Access Point (BYO AP): IT Friend or Foe?
As the bring-your-own (BYO) explosion continues, a rising tide of smartphones and pocket-sized personal hotspot gadgets are bringing BYO access points (APs) into the workplace. Whether powered by smartphone software or mobile router hardware, BYO APs can turn any 3G/4G cellular data connection into a small footprint Wi-Fi hotspot, whenever and wherever Internet access is needed.
AirMagnet Enterprise Helps University IT from Getting "Schooled" by BYOD
The Bring-Your-Own-Device (BYOD) phenomenon is growing with fervor in enterprises worldwide. And with a population of busy, information-seeking people, it isn't surprising that the trend extends to university campuses. University IT faces unique wireless challenges: inconsistent bandwidth use that ebbs and flows with the academic calendar; differing IT needs from students and staff; and the constant threat of malicious attacks that threaten not only the classroom, but also critical student and staff data.
Troubleshoot BYOD Problems Fast
The tsunami of employee-owned smart devices used at work - known as BYOD or Bring Your Own Device - has emboldened employees to feel confident in their networking skills… to the point of residential gateways, routers, access points (APs), and switches creeping into the enterprise.
Clear the Air of Layer 1 Wireless Vulnerabilities
Wi-Fi isn't just for smartphones, tablets, and laptops anymore. Cheap and relatively easy to deploy, Wi-Fi has transformed over the last decade from a convenience to a strategic network parameter. Carriers are using wireless to offload 3G and 4G cellular traffic, verticals like healthcare and retail use it for crucial applications like processing credit cards, and end users expect wireless access everywhere from the local cafe to even in the latest models of cars.
Why Secure Your Wi-Fi Router?
Occasionally we like to go a bit off topic and cover emerging general market trends. Recently I’ve been getting a lot of questions about liability associated with an unsecure Wi-Fi router. This post should help demystify the topic.
How to Handle Bad SSIDs
If you’re attending this week’s Black Hat Europe conference, check out Deral Heiland’s session on malicious Service Set Identifiers (SSIDs). According to the abstract, Heiland plans to demonstrate the use of specially-crafted SSIDs to initiate cross site scripting (XSS), cross site request forgery (CSRF), command injection and format string attacks against various Wi-Fi products.
What the Final Rule to HIPAA Means for Wireless Security
To protect individually identifiable information and realize the benefits and cost savings of new electronic medical record technology, The Health Insurance Portability and Accountability Act (HIPAA) directed the Secretary of the U.S. Department of Health and Human Services (HHS) to develop new privacy and security regulations to meet today’s healthcare security challenges.
How to Protect Yourself from the Top Wireless Hotspot Security Threats
Bring-Your-Own Mobile Malware
The tide of mobile malware continues to grow, from 2004’s tiny trickle of Bluetooth worms to a steady stream of malicious Android apps that topped 350,000 in 2012 . While this tally pales in comparison to PC malware, there’s a key distinction: most business PCs are somewhat defended by IT-managed anti-malware. The same can’t be said for consumer smartphones and tablets. In fact, you’d be hard-pressed to find a bring-your-own Android running anti-malware.
Do I really need to worry about mobile malware?
How-To Guide for Managing and Securing BYOD
Bring Your Own Device (BYOD) is as much a sign of cultural change as it is an indicator of prevailing technology trends. Shifting work patterns and the need to be smarter and more flexible have neatly coincided with the proliferation of connected devices like smartphones, tablets and netbooks. For most it’s a marriage made in heaven. Users like the freedom, spontaneity and instant-on availability of mobile and portable devices. Employers like the creativity, productivity and extended working they encourage from staff.
Quantifying BYOD impact
For IT admins concerned about planning WLAN capacity or securing WLAN access, bring-your-own Wi-Fi enabled consumer electronic devices are posing significant concerns. But just how big is their impact on enterprise WLANs? Let’s put some metrics around these trends.
According to the just-published Neilsen US Consumer Usage Report 2012:
Top 5 WLAN Security Threats to Defend Against in 2013
For nearly a decade, Wi-Fi has been a "nice-to-have" technology for most corporations, and wired networks have been the backbone for transmitting sensitive information. That time is long gone. With the explosive growth of Wi-Fi and the dramatic increase in smart devices usage, more and more industry leaders, including top retailers, manufacturers and healthcare organizations, are using Wi-Fi as a critical medium for transmitting sensitive data. Is your organization ready for the increased threats caused by this growth?
Get ready to use – and safeguard – more spectrum
At CES 2013, FCC chairman Julius Genachowski announced that regulatory efforts are well underway to free up "substantial" additional spectrum for Wi-Fi to accommodate sky-rocketing demand with less congestion. In comments made at the industry’s largest annual consumer electronics event this week, Genachowski said that the FCC hopes to expand the 5 GHz band by about 35 percent. That’s the band soon to be occupied by next-generation 802.11ac Wi-FI products, along with other government uses.
Why that’s good news…