Search
Securing K-12 WiFi - A Scary Movie Blog
Posted by Louise Peter on Oct 31, 2017

It is a classic urban legend horror scene - a young woman is home alone (she is usually a babysitter). She receives creepy phone calls asking "Have you checked the kids?" The babysitter calls the police and the police set up watch outside the house to keep the babysitter safe. The police trace the phone calls and to their horror, they discover that the calls are not coming from another location, but they are coming from inside the house.

Recent Posts

Posts by Topic

see all
free-on-demand-webinars.png
Securing K-12 WiFi - A Scary Movie Blog
Posted by Louise Peter on Oct 31, 2017

It is a classic urban legend horror scene - a young woman is home alone (she is usually a babysitter). She receives creepy phone calls asking "Have you checked the kids?" The babysitter calls the police and the police set up watch outside the house to keep the babysitter safe. The police trace the phone calls and to their horror, they discover that the calls are not coming from another location, but they are coming from inside the house.

About One CVE at the Tail End of KRACK: 13088
Posted by Hemant Chaskar on Oct 27, 2017

In my last video blog on KRACK attack, I explained the technical details of workings and countermeasures for 9 out of 10 CVEs. The one I did not discuss in detail was CVE-2017-13088. At the time there wasn't enough information available on it and though it looked like the twin of CVE-2017-13087, due to differences between how group keys are distributed in MFP mode versus non-MFP mode, it required separate consideration.  After receiving more details from the researcher (@vanhoefm), I am prepared to share  information about CVE-2017-13088 and the appropriate countermeasures.

Happy teacher using laptop with student at the elementary school.jpeg
A+ WiFi on the Big Days and Every Day
Posted by Jeff Olson on Oct 24, 2017

Johnny is excited - well, not really - because tomorrow is state-wide, academic-testing day at his school. For weeks now, his teachers have told him just how important this day is for him and his school. Even his parents were instructed on how they can help prepare Johnny for the big day: ensure he gets enough sleep, has a quality breakfast, and arrives to school on-time. Johnny isn’t thrilled by this extra attention.

WPA2 Vulnerability.png
WPA2 Key Reinstallation Vulnerabilities (KRACK) Explained
Posted by Hemant Chaskar on Oct 16, 2017

Researchers from the University of Leuven (@vanhoefm and team) have discovered flaws in WPA2 implementation in clients and APs. These flaws create vulnerabilities for replay and decryption attacks on packets transferred over WiFi links. They have named them KRACKs (Key Reinstallation AttaCKs). Both 802.1x (EAP) and PSK (password) based networks are affected. These vulnerabilities have been cataloged under 10 CVEs. In the series of videos below, I explain these CVEs in detail with Vivek Ramachandran, Founder and CEO of Pentester Academy.

Mojo Security-005909-edited.png
Is your Business Wireless Network Secure?
Posted by Jeff Olson on Oct 10, 2017

We’ve Got Your Back.

Security is top of mind for IT teams, business leaders, and the general public. News of attacks, ransomware, and data breaches has become commonplace; most recently Equifax and Yahoo. Have you stopped to ask yourself: Is my WLAN secure? Have I done all that I can to ensure is it secure? 

Do the Right Thing-184012-edited.png
Fanning the Flames of Rebellion with Honor
Posted by Rick Wilmer on Sep 14, 2017

Witnessing ethical train wreck after train wreck in Silicon Valley, it’s easy to conclude that the quest for success at all costs is a recent phenomenon and one limited to startups.

Auto Packet Capture, Where Have You Been All My Life?
Posted by Robert Ferruolo (Dr. RF) on Aug 8, 2017

You can tell how long someone has been troubleshooting networks by the length of their arms. Orangutans like me have been doing it a long, long time.  I started with a sewing machine sized Network General luggable that I carried around the world. Now I have to stand up very straight  to keep my knuckles from dragging on the ground.

Mojo’s Cognitive WiFi platform - Aware, saves network engineers from having to have shirts specially made because it includes Auto Packet Capture.

IDC_Corporate_Logo-1.jpg
Accelerate the Digital Enterprise with a Cognitively-Enabled WLAN
Posted by Nolan Greene, Sr. Research Analyst, IDC on Jun 12, 2017

What were once revolutionary words when talking about enterprise WLAN – monitoring, visibility, single-pane-of-glass management – now sound conventional to the ears of network managers. Today, for many, the features those words describe have evolved into what is now known as the “cloud console.”

As WiFi networks have moved from merely supporting the business to serving as its backbone, WLAN management must evolve as well. Yesterday's security, scalability, and remediation are inadequate for the digitally transformed enterprise in which WiFi is the conduit to customers, suppliers, and mission-critical business applications.

Toward a Vision of a Smart Classroom
Posted by Dr. Bhaskaran Raman on May 30, 2017

Have you imagined classrooms of the future, how they would look?  Today, despite the smart-device revolution and near-ubiquitous networks, technology is viewed as a distraction in a classroom, and even more so in an exam-room.  Having taught several classes of size 100+ at IIT Bombay, I believe that technology can be a positive enabler in a smart classroom.  Future classrooms should have enhanced interactivity, and enriched communication through the correct use of technology.  Students should be able to collaborate with one another, and teachers should be able to interact better with students, get feedback on their understanding, and also conduct exams easily.  The path to this vision lies in the effective use of the smart-phones already lying in the students’ pockets, to build a smart classroom.

We have conceptualized several applications in this direction.  The applications below are in different stages of development: some in early prototypes, some well tested and used.