From The Blog
-
Just When you Thought it was Safe to go Back to the Bank, Microsoft Finds Banking Attacks Targeting Financial Institutions
Written by Sean KalinichAlthough Banking, Mortgage, and other financial institutions are always under attack, it is never a good thing to see a coordinated campaign targeting them. Microsoft…Written on Friday, 09 June 2023 14:59 in News Read 257 times Read more...
-
MOVEit Zero-Day May Have Been Known by Threat Groups Since 2021
Written by Sean KalinichIn today’s episode of why we need to change how we do things; it has come to light that the critical MOVEit zero-day that allowed…Written on Friday, 09 June 2023 11:18 in News Read 439 times Read more...
-
In a Marketplace of Ideas, Censorship is Always Bad Even if Done for the Right Reasons.
Written by Sean KalinichOne thing that has always bothered me is the concept that censoring or hiding certain types of speech, thought, information etc., is somehow going to…Written on Friday, 09 June 2023 10:23 in Editorials Read 120 times Read more...
-
Bring on the Ransomware Beta Test as Royal Begins Seems to be testing a New Encryptor called BlackSuit
Written by Sean KalinichThe fine folks at the Royal ransomware group have begun testing a new flavor of encryptor that is being called BlackSuit (The hat was already…Written on Thursday, 08 June 2023 16:03 in News Read 933 times Read more...
-
Google and Microsoft Share a Zero Day as both Chrome and Edge get Patch Now Guidance.
Written by Sean KalinichGoogle has pushed out a new patch for Chrome to deal with a zero-day vulnerability tracked as CVE-2023-3079. In the patch release Google is clear…Written on Thursday, 08 June 2023 15:12 in News Read 486 times Read more...
-
Barracuda Email Security Gateway Appliances that were Exploited due to Zero-Day Must Be Replaced, not Patched
Written by Sean KalinichAfter the disclosure of a serious Zero-Day that allowed an unauthenticated user to basically own the device. Barracuda is now saying that remediation action for…Written on Thursday, 08 June 2023 12:33 in News Read 265 times Read more...
-
Minecraft Mods stuffed with Malware Used to Target Windows and Linux
Written by Sean KalinichAs we hear more about Supply Chain attacks and the need for Software Build of Materials we are now hearing of an attack on the…Written on Wednesday, 07 June 2023 15:24 in News Read 386 times Read more...
-
Sextortionists Get a Boost from AI and Publicly Available Images
Written by Sean KalinichAs if the internet needed something else bad floating around it seems that groups that engage in extortion schemes involving the threat of releasing images…Written on Wednesday, 07 June 2023 14:24 in News Read 253 times Read more...
-
New PowerShell Malware Dubbed PowerDrop used to Target US Aerospace Industry
Written by Sean KalinichIt is Wednesday, so it is about time to talk about a new strain of malware. In this case one that leverages Microsoft’s PowerShell to…Written on Wednesday, 07 June 2023 13:31 in News Read 255 times Read more...
Recent Comments
- Sean, this is a fantastic review of a beautiful game. I do agree with you… Written by Jacob 2023-05-19 14:17:50 Jedi Survivor – The Quick, Dirty, and Limited Spoilers Review
- Great post. Very interesting read but is the reality we are currently facing. Written by JP 2023-05-03 02:33:53 The Dangers of AI; I Think I Have Seen this Movie Before
- I was wondering if you have tested the microphone audio frequency for the Asus HS-1000W? Written by Maciej 2020-12-18 14:09:33 Asus HS-1000W wireless headset impresses us in the lab
- Thanks for review. I appreciate hearing from a real pro as opposed to the blogger… Written by Keith 2019-06-18 04:22:36 The Red Hydrogen One, Possibly One of the Most “misunderstood” Phones Out
- Have yet to see the real impact but in the consumer segment, ryzen series are… Written by sushant 2018-12-23 10:12:12 AMD’s 11-year journey to relevance gets an epic finish.
Most Read
- Microsoft Fail - Start Button Back in Windows 8.1 But No Start Menu Written on Thursday, 30 May 2013 15:33 in News Be the first to comment! Read 115121 times Read more...
- We take a look at the NETGEAR ProSafe WNDAP360 Dual-Band Wireless Access Point Written on Saturday, 07 April 2012 00:17 in Pro Storage and Networking Be the first to comment! Read 84248 times Read more...
- Synology DS1512+ Five-Bay NAS Performance Review Written on Tuesday, 12 June 2012 20:31 in Pro Storage and Networking Be the first to comment! Read 78445 times Read more...
- Gigabyte G1.Sniper M3 Design And Feature Review Written on Sunday, 19 August 2012 22:35 in Enthusiast Motherboards Be the first to comment! Read 77795 times Read more...
- The Asus P8Z77-M Pro Brings Exceptional Performance and Value to the Lab Written on Monday, 23 April 2012 13:02 in Consumer Motherboards Be the first to comment! Read 67392 times Read more...
Displaying items by tag: Wirless Security
New Protocl may help to Secure Wireless
Security is the bane of every network in the world. It is the reason why so many IT technicians end up burnt out or (in the case of men) bald. We all know that the only secure system is one that does not allow anything (and I mean ANYTHING) to connect, or input to the system. As soon as you connect a system to any type of input device or medium (say a network/the Internet) you open up vulnerabilities.
Even the most sophisticated firewall can be gotten around with time, effort and some creativity. This is all just the wired networks; we have not even begun to talk about wireless networks. These handy security holes create a whole new level stress for the IT technician. After all with not much more than a laptop and the right Lunix ISO you can grab packets out of the air and find out the WEP, WPA and if you are patient enough even WPA2 keys. True you can add RADIUS (Remote Authentication Dial In User Service) and certificates into the mix if you have the budget, but what about the home user? Or even better… what about our cellular networks?
For a long time it was thought that wireless could be secured with simple encryption and trusted networks. Then we found that these data packets can be intercepted in route and either spoofed or blocked creating a security breach. This, in extremely simplistic terms, is a Man-in-the-Middle attack and it is a very dangerous one.
Fortunately some researchers at MIT have developed a protocol that can potentially prevent these be encoding a specific transmission sequence in the originating packet. The sequence is a series of ones and zeros (data and silence) that when put together indicate to the receiving party that this is the correct sender. It does this in multiple ways to prevent, blocking, Collision, and spoofing of packets which are used by the most common Man-in-the-Middle attacks. The nice thing about this new protocol is that it can be applied to almost any network including both 4G network types.
Source NetworkWorld
Discuss in our Forum