If you’ve never used Wireshark with promiscuous mode enabled, I highly recommend it – if you’re into geeky things that is. I know I am! This should go without saying, be responsible in what you do. Promiscuous mode allows a capable wireless network interface card (WNIC) to listen to all wireless traffic, regardless if the traffic is destined for your client machine or not. … [Read more...]
Dear Journal and the Misconfigured Access Points
Dear Journal, Flight to Spain from London was a short one. My owner made a friend on the flight and I stayed powered off during the entire 2-hour and 25-minute duration. Ibiza, pronounced ‘Ee-bee-tha’, attracts nearly six million tourists a year. Not bad for 571 square kilometers (220 square miles) island with a population of around 150,000 people. From the plane, we … [Read more...]
Making Tough Decisions Between Wave 1 and Wave 2 Access Points
You finally made a decision to deliver not just Wi-Fi access, but secure Wi-Fi access to your business, customers, and guests. Now, you’re at a crossroad because you don’t know whether to go with Wave 2 or Wave 1 technology. With people streaming videos, music, photos and games, today’s digital content is bigger and better than ever. People are interacting with multiple … [Read more...]
Top 10 US Cities for Unprotected Internet Devices
Ever wonder which parts of the country have the most unprotected devices? A recent Dark Reading article shared research on the geographical distribution of discoverable, unprotected, Internet-connected devices among the 10 most populated cities in the US. The study showed that firewalls were the top exposed service within each city, while routers, wireless access points, … [Read more...]
The Critical Nature of Classification
The widespread adoption of connected devices has changed our lives forever. Walk into any coffee shop, hotel, airport or gym today and you’re almost guaranteed to be welcomed by free public Wi-Fi. While this constant accessibility offers incredible convenience to businesses and end-users alike, these benefits also come with some security challenges. “While wireless attacks … [Read more...]