Networking – Wired & Wireless

Home/Networking – Wired & Wireless

Unisys unveils invisibility cloak for network traffic

By |May 15th, 2014|Categories: IT Industry, Networking, Networking – Wired & Wireless, Tech News|Tags: , |

Network World – If you are ultra paranoid, what could be better than hiding your network traffic in such a way that no one could possibly intercept it? This is what Unisys is offering with its new Stealth appliance, which could make man-in-the-middle attacks and keylogger exploits obsolete, or at least more difficult to mount.

Stealth has been around since 2005, when it was developed exclusively for the Defense Department, which remains one of its largest customers. Several years ago Unisys took it to commercial enterprises and has paid for various independent tests to try to compromise the system, all of which have failed.

This is because Stealth uses four layers of security: each packet is encrypted with AES256, then split into three separate pieces and dispersed across the network, destined for a particular group of users that have to be running its protocols.

To deploy Stealth, you create virtual “communities […]

Philips smart TVs can be attacked via default wireless connection

By |March 28th, 2014|Categories: Networking – Wired & Wireless, Tech News, Virus Alerts, Wireless Access|

The latest firmware for some Philips smart TVs opens an insecure Miracast wireless network by default, security researchers from ReVuln said

March 28, 2014
(IDG News Service)

The latest firmware in some Philips smart TV models opens an insecure Miracast wireless network, allowing potential attackers located in the signal range to control the TV remotely and perform unauthorized actions.

Researchers from Malta-based vulnerability research firm ReVuln recently published a video demonstration of what attackers can do after they connect to the insecure wireless networks of the affected Philips TVs. The potential attacks include: accessing the TV’s configuration files; accessing files stored on USB devices attached to the TV; broadcasting video, audio and images to the TV; controlling the TVs via an external remote control application and stealing website authentication cookies from the TV’s browser.

The insecure network is opened by Miracast, a feature that […]

Get Organized: Set Up Your Wireless Office

By |January 20th, 2014|Categories: Networking – Wired & Wireless|

It’s not hard to impress clients and business partners with a high-tech wireless office, even if it’s just your home office. Here’s some advice on the equipment you’ll need and resources to help you set it up.

Let’s say you have a home office or small business office. You want to impress clients with a high-tech space that’s completely clear of clutter—and wires. How do you ditch all those cables and cords to get all your equipment wirelessly connected?

With Wi-Fi capabilities, Bluetooth, and a really good router, setting up a wireless office isn’t all that difficult. But it does mean starting with the right devices.

What’s the Most Important Purchase?

I asked two technology experts who know about small business, my colleagues Fahmida Y. Rashid and Samara Lynn, what is the most essential item to purchase before setting up a wireless office.

Get Organized

“The most important piece of equipment […]

What We Want Obama to Say About the NSA Spying Programs

By |January 1st, 1970|Categories: Networking – Wired & Wireless|

The biggest security story of 2013 involved the leaks from Edward Snowden that exposed the National Security Agency’s massive spying program. The leaks have kept coming, but today President Obama is scheduled to address some of the issues that have come to light.At Security Watch, we’ve been following the story as it’s developed. Here’s what we’d like Obama to say.

More Focused Investigations
The biggest objection to the NSA’s spying program is that it sweeps up data from suspects and non-suspects alike. The government argues that doing so does not infringe on individual rights since no one in the agency should ever see “innocent” information. They point to XKEYSCORE, the search system devised by the NSA, which requires each search query to be accompanied by a reason for accessing the data.

But frankly, that’s not good enough. Mass data collection is irresponsible for a number of reasons, and undermines the precept that […]

NFL, Extreme Networks Team Up to Make Stadiums Smarter

By |January 1st, 1970|Categories: Networking – Wired & Wireless|

  • January 15, 2014 05:46pm EST

The NFL’s stadiums are being outfitted and retrofitted with enough cellular and Wi-Fi coverage to keep tens of thousands of smartphone-toting, Internet-addicted fans dialed into their social networks, fantasy teams, and other game-day action on Sundays.


Now the wireless networks at many of those venues will be getting smarter.


A new deal between the league and Extreme Networks makes the networking solution provider the NFL’s go-to number-cruncher of all the data generated at wired stadiums, the NFL said Wednesday. That’s part of an effort to deliver “more immersive” fan experiences with better apps and in-stadium services available to football fans.


The NFL has contracted Extreme Networks to be the official Wi-Fi analytics provider for the league, a job that kicks off under the brightest possible spotlight, Super Bowl XLVIII on Feb. 2 at MetLife Stadium in East Rutherford, N.J.


The upshot, according to the NFL, is that teams will […]

How to Send Dodgy-Looking Legitimate Emails, Target-Style

By |January 1st, 1970|Categories: Networking – Wired & Wireless|

Target sent an email to customers informing them their personal information may have been stolen. Unfortunately, many of the people who received the email thought it was a scam.Shortly after Target admitted attackers had stolen payment card information and personal information belonging to its shoppers, experts warned consumers to be on the lookout for Target-related scams, such as phishing emails and malicious attachments. These secondary attacks are very common after a data breach, as criminals know users are looking for more information as well as wondering if they were part of the impacted group.This week, Target sent out emails addressed to “Dear Target guest” with elements which raised warning flags and made recipients wonder at the message’s authenticity. The sender email address wasn’t from, and some people wondered why they received the email when they weren’t Target customers. The message also contained a link and asked users to click […]

Snapchat Spam Caused by Lax Security, Not by Rapid Growth

By |January 1st, 1970|Categories: Networking – Wired & Wireless|

The experts at Cloudmark have been tracking (and eliminating) spam for 13 years. Cloudmark DesktopOne Basic 1.2 is our Editors’ Choice for desktop spam filtering. When Cloudmark researcher Andrew Conway weighs in on the subject of spam, I pay attention.

As you surely know, a recent Snapchat data breach exposed personal details for 4.6 million users and resulted in a surge of Snapchat spam. The official word from Snapchat: the spam flood “is the consequence of a quickly growing service.” In a detailed blog post, Conway points out why this ain’t necessarily so.

Who’s Your Friend?
A Snapchat post suggests you can avoid spam by configuring the product so only your friends can send snaps. Conway points out that a stranger can still send you a friend request, with an attached snap pending. Snapchat claims no connection between the data breach and spam surge. Conway points […]

Amid Attacks, CEOs In The Dark About Cyber Security

By |January 1st, 1970|Categories: Networking – Wired & Wireless|

When it comes to security, CEOs have no clue what is going on inside their organizations. So found a Ponemon Institute report released this week which examined how organizations prepared for, and responded to, security incidents. A whopping 80 percent of survey respondents said they did not “frequently communicate” with executive management about potential cyber-attacks threatening the organization. This extends beyond the CEO and encompasses the entire C-suite (CIO, CSO, COO, CTO, etc).

It was surprising that “the information is just not getting up to the C-suite,” Mike Potts, president and CEO of Lancope, told Security Watch. “We talk about this stuff all the time,” he added.

Companies are spending millions of dollars on security products and services and still getting breached, according to Lancope, who commissioned the study. In fact, Gartner said $67 billion was spent on IT security products globally in 2013. Yet $250 billion worth of intellectual property is […]