Blackhat Wi-Fi Security Reports and Nuances of Detection Methods

blackhat USA 13

| Shortly following the conclusion of Blackhat’13, a few articles came out reporting wireless scanning data from the venue.   Inside the Black Hat 2013 Wi-Fi Network   Karma is a …Errr, What We Learned at BlackHat 2013    Both reports state that many security relevant events were detected in the Wi-Fi traffic during the… Read More

BYOD and WPA2 – not made for each other

BYOD and WPA2: Not Made for Each Other!

As the BYOD (Bring Your Own Device) tide rises, the  network and security admins wonder if their existing Wi-Fi infrastructure security will hold on. In particular, will WPA2 with PEAP, which is pretty much the norm for the Wi-Fi infrastructure security in the enterprise networks today, continue to be adequate? WPA2 with PEAP is simple… Read More

Wi-Fi Insecurity Wrap-up for 2010

The year 2010 witnessed continued growth in the enterprise WiFi deployments. The growth was fueled by the latest 802.11n revision to WiFi technology in the late 2009 and ready availability of WiFi in most consumer electronic devices launched in 2010, including the smart phones, printers, scanners, cameras, tablets, TVs, etc. The year 2010 also witnessed… Read More

WPA2 Hole196 Webinar Q&A

Due to the overwhelming attendance and response we got to the recent WPA2 Hole196 webinar, we did not have time to answer all the questions asked during the webinar. In this post, we are keeping our promise and answering those webinar questions. By the way, the webinar slides and recording from this webinar as well… Read More

WPA2 finds itself in a “hole”! Vulnerable to insider attacks!

WPA2_Hole196

Wi-Fi security has experienced a lot of churn over the last decade. As protocols like WEP and TKIP fell by the wayside, WPA2 emerged as the “Last Wi-Fi Security Protocol Standing.” Wi-Fi Alliance recently announced its plan to phase out WEP and TKIP, promoting WPA2 as the go-to security standard. With solid protection in the… Read More

WiFish Finder: WiFi Honeypot vulnerability assessment made simple

What % of WiFi laptop users in your organization are vulnerable to WiFishing attacks? The odds are very high that you don’t have an exact answer.   WiFish Finder is a tool for assessing whether WiFi devices active in the air are vulnerable to ‘Wi-Fishing’ attacks. Assessment is performed through a combination of passive traffic… Read More