Search
Securing K-12 WiFi - A Scary Movie Blog
Posted by Louise Peter on Oct 31, 2017

It is a classic urban legend horror scene - a young woman is home alone (she is usually a babysitter). She receives creepy phone calls asking "Have you checked the kids?" The babysitter calls the police and the police set up watch outside the house to keep the babysitter safe. The police trace the phone calls and to their horror, they discover that the calls are not coming from another location, but they are coming from inside the house.

Recent Posts

Posts by Topic

see all
free-on-demand-webinars.png
Securing K-12 WiFi - A Scary Movie Blog
Posted by Louise Peter on Oct 31, 2017

It is a classic urban legend horror scene - a young woman is home alone (she is usually a babysitter). She receives creepy phone calls asking "Have you checked the kids?" The babysitter calls the police and the police set up watch outside the house to keep the babysitter safe. The police trace the phone calls and to their horror, they discover that the calls are not coming from another location, but they are coming from inside the house.

About One CVE at the Tail End of KRACK: 13088
Posted by Hemant Chaskar on Oct 27, 2017

In my last video blog on KRACK attack, I explained the technical details of workings and countermeasures for 9 out of 10 CVEs. The one I did not discuss in detail was CVE-2017-13088. At the time there wasn't enough information available on it and though it looked like the twin of CVE-2017-13087, due to differences between how group keys are distributed in MFP mode versus non-MFP mode, it required separate consideration.  After receiving more details from the researcher (@vanhoefm), I am prepared to share  information about CVE-2017-13088 and the appropriate countermeasures.

WPA2 Vulnerability.png
WPA2 Key Reinstallation Vulnerabilities (KRACK) Explained
Posted by Hemant Chaskar on Oct 16, 2017

Researchers from the University of Leuven (@vanhoefm and team) have discovered flaws in WPA2 implementation in clients and APs. These flaws create vulnerabilities for replay and decryption attacks on packets transferred over WiFi links. They have named them KRACKs (Key Reinstallation AttaCKs). Both 802.1x (EAP) and PSK (password) based networks are affected. These vulnerabilities have been cataloged under 10 CVEs. In the series of videos below, I explain these CVEs in detail with Vivek Ramachandran, Founder and CEO of Pentester Academy.

Mojo Security-005909-edited.png
Is your Business Wireless Network Secure?
Posted by Jeff Olson on Oct 10, 2017

We’ve Got Your Back.

Security is top of mind for IT teams, business leaders, and the general public. News of attacks, ransomware, and data breaches has become commonplace; most recently Equifax and Yahoo. Have you stopped to ask yourself: Is my WLAN secure? Have I done all that I can to ensure is it secure? 

A Mojo Customer Story: Merseyrail's Seamless WiFi Experience for Passengers
Posted by Erika Hashemi on Jun 29, 2017

Merseyrail is one of the most punctual and reliable railway networks in the UK, running 800 trains and carrying over 100,000 passengers daily.
Merseyrail is currently 14 years into a 25-year concession managed by local transport authority, Merseytravel. Concession reviews are undertaken every five years, and it was between two review dates that Kevin Lindsay, Business Systems Support Analyst for Merseyrail became aware of the spike in passenger demand for WiFi access and recognized that something had to be done.

ESC6_Logo_Dedicated_to_Serve_transparent.png
The Region 6 ESC and Mojo Partnership, Opening the Doors for Digital Learning Throughout Texas
Posted by Erika Hashemi on May 15, 2017

In March of 2016, Texas Governor Greg Abbott announced the launch of the Classroom Connectivity Initiative, designed to facilitate access to technology in a world where learning is no longer confined to the pages of a book or the walls of a classroom. Working with the Texas Education Agency and Education Service Centers like Region 6, the State aims to equip every classroom with robust connectivity to support each student’s digital learning experience.

Securing 30,000 Students and Beyond
Posted by Erika Hashemi on Apr 3, 2017

On any given day, the Santa Rosa County School District has 30,000 students accessing WiFi across 31 elementary, middle and high schools.  As WiFi is quickly becoming the prevalent network access technology in schools, Santa Rosa knew they needed to have a secure and reliable WiFi network in order to provide a pristine user experience on an ongoing basis.

The School District needed a comprehensive WiFi network monitoring and security solution that would provide complete visibility and control of the wireless airspace, all of which was lacking in the wireless controller solution previously deployed. With a small central IT staff to cover the 31 school locations, the ability to remotely manage and quickly troubleshoot WiFi networks was critical.

Like Peanut Butter and Chocolate… Performance and Rogue Detection is Always Better Together
Posted by Sean Blanton on Nov 18, 2016

We all know performance testing is as important a task as any in the WiFi business. We need to know the limits of our access points after all, and it certainly helps you to have all the information at hand to make the most informed decision you can. But performance testing focused soley on speed? Well, while it's important, it doesn't give you all the information you need. Because you, dear reader, are not just upgrading your WiFi for speed. You want all the bells and whistles that come standard with enterprise WiFi platforms today. And you want to turn them all on. And most importantly, you want to know if and how they affect speed.

Why Your Access Points Need a Third 2x2 11ac Radio for Security
Posted by Hemant Chaskar on Jun 21, 2016

WIPS monitoring requires scanning all WiFi channels in round-robin fashion to detect threats and vulnerabilities. This scanning can be in one of two forms:

  1. background scanning, in which a radio that provides WiFi access service intermittently scans off-service channels, or
  2. dedicated scanning, in which a radio is dedicated to security and does not provide WiFi access service.

For enterprises that desire strong WIPS security and/or those that deploy real-time applications, background scanning isn’t adequate for the following reasons: