How Long Will Wi-Fi Protect You from Carrier Monetization Programs?

Do Carriers Track You?

In the last couple of weeks, several reports on carriers’ plans and practices to track and analyze their mobile web traffic caught the attention of consumers and privacy watchers.

According to media reports, US and international carriers are experimenting with inserting unique identifiers into the data traffic flowing between your smart phone and websites you visit.   Read more

iOS8 MAC Randomization – Analyzed!

iOS8 MAC Randomization – Analyzed! via blog.airtightnetworks.com

In June of this year, at WWDC#14 Apple announced that the Wi-Fi scanning behavior of their devices would change starting with iOS8. They would start using randomized and locally administrated MAC addresses in the probing state. The touted rationale was that such an approach would hide the real MAC addresses of the device and make Wi-Fi device MAC based analytics difficult. Apple made iOS8 generally available as part of their September 2014 launch. Accordingly, it was time for me to take out the packet sniffing gear and dig into the workings of randomized MACs (no pun intended here). Read on to find out how they work.   Read more

How to implement BYOD with Wi-Fi / WIPS assist

Monitor new devices entering Wi-Fi

| Wi-Fi has become the de facto access medium for smart mobile devices in enterprise networks. Sitting at the edge of the network, Wi-Fi can assist greatly in implementing secure and disciplined BYOD in these networks. There is no one-size-fits-all when it comes to BYOD management in the enterprise. However, from my experiences working with Wi-Fi and… Read More

Securing your network from bring-your-own-device (BYOD)

table1

Managing BYOD in the enterprise is not a simple task. Encryption, MDM, virus protection etc. as mentioned in Ashley Furness’ post on the subject are all helpful, but preventing anauthorized devices or rogue APs from getting on your network at all is the real goal. WIPS is the perfect ally to all those tools.   Read more

Don’t let BYOD turn into “BYOR” in your network

505airport

BYOD (Bring Your Own Device) seems to be the dominant theme for 2012 in the Wi-Fi infrastructure and security space. As people increasingly bring in personal smartphone devices on the enterprise premises, the network/security administrators are grappling with the security implications. Given how engaging the new smartphone and tablet apps are, conflict arises between the users’… Read More