Posts

Aerohive Wireless Solutions

Aerohive Networks has introduced an innovative new class of wireless infrastructure equipment called a Cooperative Control Access Point (CC-AP). A CC-AP combines an enterprise-class access point with a suite of cooperative control protocols and functions to provide all of the benefits of a controller-based wireless LAN solution, but without requiring a controller or an overlay network. Aerohive Networks implementation of a CC-AP is called a HiveAP. Read More

We are under attack !

Surprisingly the UK Government has made recent press releases about the possibility of cyber attacks against their systems. I have worked in the IT Security space for 16 years and the possibility of attacks and espionage have always been a very real threeat. Indeed I have been called in to investigate many instances of such threats. Whether it be a virus, direct attack or intrusion they have all been very real for many years. Vigilant and responsible companies have consistently carried out the necessary measures to at least protect themselves from the majority of the well known exploits and deploy other systems to alert for suspicious network activity. They train staff and continue to review their policies on a regular basis. Standards have been implemented to enforce and to some degree, force companies and institutions to fall in line with specific levels of security, so why should the Government assume that they were somehow immune from such attacks. This is nothing new, althou...

Hackers penetrated Nasdaq computers

Full Story CNET

UK Threat From CyberAttacks

UK Under Threat From CyberAttacks

Passwords...nothing new...just a recap

Been doing a lot of work around password security lately and I think it is fair to say that given enough time any password can be cracked. The time could be hundreds or thousands of years in some cases when using brute force methods . In reality though this time is likely to be a lot shorter than we think due to end users only being able to cope with relatively short passwords. Using various tools on windows XP and Vista and 7 machines it was surprising to see just how many passwords were recovered in a matter of minutes and not hours or years even. Passwords on Windows machines can be local or cached Domain credentials. Password attacks can be classified into two main categories: Online: Where the attacker is physically on the PC or network in question and is either actively trying tools against the host pc or attempting to sniff the traffic to and from that machine for hashes on the wire(Later take offline). An important note here is that we do not need administrative credent...

Stuxnet worm hits Iran nuclear plant staff computers

Stuxnet worm

Is the Zeus Trojan the greatest malware threat of the current age?

SC Magazine Full Story