Ubiquiti, a global networking technology company came onto the mainstream marketplace beginning in 2005 with a clever idea of offering products at low prices to mass markets guiding channel players to monetize their services instead of the hardware. Every strategy has its pluses and minuses and some would say Ubiquiti’s low-price leader concept swung the pendulum too far, … [Read more...]
Meraki’s Air Marshal Gets Help from a New WIPS Sheriff
Wi-Fi hacking is a hot topic, but one that’s plagued by ambiguous and often contradictory technical terminology. Luckily, the lack of common definitions for Wi-Fi threat vectors has actually produced a solution to the problem: the Trusted Wireless Environment. The Trusted Wireless Environment framework succinctly defines the six Layer 2 Wi-Fi hacks that affect nearly every … [Read more...]
Additional WPA3 Dragonblood Vulnerabilities
The same security researchers that disclosed the initial five WPA3 vulnerabilities (referred to as Dragonblood) earlier this year in April, have recently disclosed two additional WPA3 vulnerabilities. Just like the initial five Dragonblood vulnerabilities, these two new ones allow attackers to either downgrade or bypass WPA3 encryption protected networks via brute force … [Read more...]
How MSPs Can Get a Leg Up on Their Competition with Wi-Fi Security
I’m a little embarrassed to admit this, but I think about Wi-Fi ALL THE TIME. Not just because Wi-Fi has become a necessity that I can’t live without, but also because I work for a company whose mission is to not only offer Wi-Fi to our partners and customers, but offer them secure Wi-Fi, so that they don’t ever have to worry about their data being compromised by … [Read more...]
Establishing a Global Standard for Wi-Fi Security
When was the last time you thought about the security of your wireless communications? We’re constantly leveraging Wi-Fi networks during business meetings, and at coffee shops, restaurants, airports and more. It’s almost second nature to tap into the local Wi-Fi network wherever we go. And while wireless security and privacy standards have been around for quite some time, none … [Read more...]