Search
A Mojo Customer Story: Universidad Alfonso X El Sabio (UAX)
Posted by Cherie Martin on May 22, 2017
undefined-114932-edited-983002-edited.jpg

Today’s learning environments are evolving and growing at a rapid pace, with more students & faculty accessing and sharing online content than ever before.  For many schools, it is a balancing act to meet the demand for ever-increasing bandwidth on a secure network utilizing fixed budgets and existing IT staffing levels.  

Posts by Topic

see all
free-on-demand-webinars.png
Mojo Networks’ C-130 is Gold
Posted by Kaustubh Phanse on Dec 16, 2016

We just got notice on some very exciting news on the K-12 education and Higher Education front. Mojo Networks and its C-130 have won New Product of the Year Awards! One for best new networking product for the K-12 market in School Planning & Management, and one for best new networking product for the higher education market in Campus Planning & Management.

The Future of Enterprise WLAN in 2013 and Beyond
Posted by Kaustubh Phanse on Apr 9, 2013

|

If predictions from leading technology analyst firms are to be believed, the worldwide Wi-Fi market will continue to grow.

Dell’Oro estimates the Wi-Fi market to grow to $9.9 billion by 2016 of which the enterprise WLAN segment alone is estimated to be over $5 billion in revenues.

Gartner anticipates an even faster growth for the enterprise WLAN segment, with spending expected to reach $7.9 billion in 2016.

Here are a few trends (some of which are already happening!), which will go hand-in-hand with this next wave of massive growth in the enterprise WLAN market.

<h1

A growing number of enterprises will want to extend their Wi-Fi rollout across remote locations, e.g., branch offices, retail stores, distribution centers, restaurants, and the list could go on. The key challenge then would be to have centralized visibility and management of the entire deployment—ideally from a single console.

This trend will make the traditional controller-based architecture outdated sooner than later because it was not designed to manage Wi-Fi networks across geographically distributed sites. It’s too complex, costly, and does not scale. The change of guards is evidenced in the number of recent announcements by controller-based WLAN vendors. Some are hiding the controller in the cloud, some are hiding them in arrays, some are saying that they are giving customers a “choice” to turn it off (without telling them what functions will stop working without it!), while some are simply giving their marketing a “controller-less” spin. Unfortunately, you can’t turn a fork into a spoon overnight to eat soup instead of spaghetti! Or maybe you can! ;-)

Android found vulnerable to sidejacking!
Posted by Kaustubh Phanse on May 18, 2011

Last Friday, a vulnerability in Google's ClientLogin Protocol was disclosed that makes most Android users vulnerable to "sidejacking." All services (Calender, Contacts, Picasa, Stock Quotes, etc.) that use the Google's ClientLogin API for "Auto Sync" are vulnerable.

Sidejacking (aka session hijacking) is not new to Wi-Fi. Firesheep that caused a stir last October is a recent example of a tool demonstrating sidejacking attack against Twitter and Facebook. The latest vulnerability though holds significance given the huge userbase of Android smartphones commonly using their smartphones at Open Wi-Fi hotspots.

WPA2 Hole196 Webinar Q&A
Posted by Kaustubh Phanse on Aug 21, 2010

Due to the overwhelming attendance and response we got to the recent WPA2 Hole196 webinar, we did not have time to answer all the questions asked during the webinar. In this post, we are keeping our promise and answering those webinar questions.

By the way, the webinar slides and recording from this webinar as well as answers to the frequently asked questions on Hole196 and a white paper are available here.

So here we go!

WPA2 finds itself in a "hole"! Vulnerable to insider attacks!
Posted by Kaustubh Phanse on Jul 23, 2010

Wi-Fi security has experienced a lot of churn over the last decade. As protocols like WEP and TKIP fell by the wayside, WPA2 emerged as the "Last Wi-Fi Security Protocol Standing." Wi-Fi Alliance recently announced its plan to phase out WEP and TKIP, promoting WPA2 as the go-to security standard.

With solid protection in the form of AES encryption and 802.1x based authentication, there was no reason to look beyond. WPA2 did its job well keeping the bad guys outside, out of the network. And traditionally that has always been the focus of Wi-Fi security.

But...!

Has your data been "Woogled"?!
Posted by Kaustubh Phanse on Jun 3, 2010

The WiFi snooping row Google has gotten itself into seems to be far from over. In April, Google revealed that its Street View cars had been collecting basic data such as the MAC addresses and SSIDs of WiFi networks in the vicinity. But after German authorities asked Google to audit the data, it admitted to have been "mistakenly" snooping payload data from Open WiFi networks. Apparently, a piece of WiFi data analysis code, written by Google engineers back in 2006, was part of the software used by the Street View cars, in turn leading to the WiFi snooping (of about 600 GB of data across 30 countries!).

Wireless Forensics: A Review from RSA Conference 2010
Posted by Kaustubh Phanse on Apr 30, 2010

With more enterprises deploying wireless LANs and employee-owned WiFi devices flooding enterprises, wireless LAN forensics is becoming a key component of any network forensic audit -- whether to prove compliance with a regulation such as PCI DSS or in response to a security incidence. But wireless presents unique challenges to forensic audits.

Last month, at RSA 2010 conference in San Francisco, I had the oppourtunity to discuss this issue with experienced auditor and certified PCI QSA Jim Cowing. Here you can view the video recording of an abridged version of our RSA 2010 talk "Anatomy of a Forensic Audit: How Wireless Changes the Game."

 

Let me summarize the highlights from the talk:

Humpty Dumpty sat on a wall...
Posted by Kaustubh Phanse on Mar 16, 2010

Every now and then we run into network administrators and CSOs that brag about how their organization is not vulnerable to wireless security threats, only to see their rash confidence fizzle out once the results from a wireless vulnerability assessment or penetration test are out.

Today, most are aware that Open WiFi on enterprise network is foolish and using WEP encryption is a bad idea and that WPA2/802.1x is the way to go. Then where do they go wrong?

802.11n ratified as IEEE standard
Posted by Kaustubh Phanse on Sep 14, 2009

Finally the news that everybody in the WiFi world has been waiting for! Exactly six years after the 802.11n task group was formed, 802.11n got the final ratification as IEEE standard last Friday.