Did they pass? You’ll have to read on to find out... Ruckus, which is now a part of Commscope via acuquisition in 2018, came into the business-class Wi-Fi market in 2002 with a disruptive antenna design. At the time, the antenna technology was quite novel and utilized multiple electrically-steerable antenna arrays to focus signal to desired targets such as laptops or mobile … [Read more...]
How To Stop Wi-Fi Hackers Abusing Ubiquiti’s UniFi Access Points
Ubiquiti, a global networking technology company came onto the mainstream marketplace beginning in 2005 with a clever idea of offering products at low prices to mass markets guiding channel players to monetize their services instead of the hardware. Every strategy has its pluses and minuses and some would say Ubiquiti’s low-price leader concept swung the pendulum too far, … [Read more...]
Meraki’s Air Marshal Gets Help from a New WIPS Sheriff
Wi-Fi hacking is a hot topic, but one that’s plagued by ambiguous and often contradictory technical terminology. Luckily, the lack of common definitions for Wi-Fi threat vectors has actually produced a solution to the problem: the Trusted Wireless Environment. The Trusted Wireless Environment framework succinctly defines the six Layer 2 Wi-Fi hacks that affect nearly every … [Read more...]
5 Hot Topics From Wi-Fi NOW 2019 London
Wi-Fi NOW, an independent organization led by Claus Hetting, exists to hold the thought leadership agenda for the Wi-Fi industry. Their mission is to support and promote all things Wi-Fi and they work with individuals, carriers, service providers, tech vendors, and regulators. Basically, if there’s something happening in the world of Wi-Fi, it’s discussed at one of Wi-Fi … [Read more...]
Additional WPA3 Dragonblood Vulnerabilities
The same security researchers that disclosed the initial five WPA3 vulnerabilities (referred to as Dragonblood) earlier this year in April, have recently disclosed two additional WPA3 vulnerabilities. Just like the initial five Dragonblood vulnerabilities, these two new ones allow attackers to either downgrade or bypass WPA3 encryption protected networks via brute force … [Read more...]