When a wireless device of any kind sends data from one location to another, the device needs to protect the data just as if it was traveling over a wired network. Unfortunately, that is often not the case as several security researchers proved at Black Hat and Def Con. Tools exist that allowed the researchers to capture data traveling over different types of wireless protocols … [Read more...]
IoT Devices: Fast, Cheap or Secure…Pick Two
The IoT market is growing at a rapid pace and manufacturers are under pressure to quickly provide new products. As a matter of fact, Bain estimate that by 2020 annual IoT revenues will reach $470 Billion, and McKenzie & Company predicts the annual growth rate of IoT devices to be about 33 percent. Unfortunately, this fast-paced growth comes at a price – a lack of IoT … [Read more...]
Top 10 US Cities for Unprotected Internet Devices
Ever wonder which parts of the country have the most unprotected devices? A recent Dark Reading article shared research on the geographical distribution of discoverable, unprotected, Internet-connected devices among the 10 most populated cities in the US. The study showed that firewalls were the top exposed service within each city, while routers, wireless access points, … [Read more...]
Wireless 802.11 Car Hack – Daily Security Byte EP. 268
Connecting cars to the Internet through GSM cellular networks already proved dangerous, but what if you built a wireless access point into your car? Watch today's video to learn how car thieves might exploit the latest car hacking research. (Episode Runtime: 3:44) Direct YouTube Link: https://www.youtube.com/watch?v=UBSGDeoFykw EPISODE REFERENCES: Reseachers hack … [Read more...]
Big Security in a Small Package
At WatchGuard, we believe that good things can come in small packages. Our smallest tabletop appliances run the same operating system, or firmware, as the largest rack mount units. This means we can provide enterprise class security in a small form factor that helps protect small offices, retail stores, and remote branches of a distributed enterprise. This is why we are very … [Read more...]