Thursday, August 30, 2018

Management Frame Detection?

Nope! But MFD does stand for something even more exciting! Mobility Field Day (3!) is just around the corner! As a long time delegate with a few minutes to burn on the family PTO trip, I thought I’d take a moment to reflect on the upcoming event. As you can see from the Tech Field Day page there are tons of great sponsors lined up. Here is my take on the coming week, the sponsors strengths, weaknesses, and what I’d like to see. In order of presentation:

Arista (http://techfieldday.com/companies/arista-networks/, @AristaNetworks)

Arista has made a splash in the Wi-Fi space with their recent acquisition of Mojo Networks (nee: AirTight). I’m happy to see Mojo get scooped up, especially in the ever diminishing landscape of infrastructure providers especially since they have a strong story about ‘hardware agnostic’ solutions. Their story since the AirTight days has been one of open platforms and this strength has carried them to the success they’ve had so far. Arista has not. Admittedly I’m not a strong Data Center switch guy, but I don’t see a similar story of how the open, commodity hardware platforms with custom ‘better than you’ software on top meshes well with their corporate messaging. I’d love to see some reconciliation on that front, and a clear vision for the Mojo team moving forward. Please spare me the ‘HP acquired Aruba’, ‘Cisco acquired Meraki’, and those companies are fine story. Paint me a genuine story of market leadership backed by strong technical chops that promise to survive the acquisition.

Aruba (http://www.arubanetworks.com/, @ArubaNetworks)

Aruba (a Hewlett Packard Enterprise company) has been touting ‘industry leadership’ on several fronts recently. They have clearly claimed leadership on several fronts including WPA3 and some intriguing messaging around 802.11ax. Their strength is messaging. They do it well, but I fail to see how Aruba single handedly ‘landed’ WPA3 and how their messaging around 802.11ax (buy when *we’re* ready, but not anyone else) is anything more than corporate marketing fluff. I’d love to see how they are helping the industry move forward *as a whole* on more than just ‘standards stuff coming down the road’. Help me understand why Aruba’s implementation of QCA radios is better than someone else’s. Help me understand why their switches brings more value to an enterprise other than an ABC play. Help me understand why end to end networking with the Aruba logo on it is better.

Cisco (http://www.cisco.com/, @Cisco)

Cisco, the 800 lb. gorilla that everyone loves to hate. Cisco is a machine unlike any other. They have critical mass despite themselves and are painting some intriguing messaging around Assurance products that seem to resonate well with the on-premises enterprises. All other networking aside (routing, switching, security, Data Center, etc), Cisco Wi-Fi has seemingly lost its way as of late. Their adoption of QCA radios (CleanAir is awesome, unless they sell an AP without it!), their continued duality around the Meraki acquisition (it’s right when it will land a sale), and the feature gaps as new platforms come online has always stuck in my craw. The 802.11ac wave 2 APCOS change (the OS on the APs) debacle has left many with souring appetites for a monolithic beast of an assurance platform. I’d love to see how Cisco is involved in driving standards (WPA3, 802.11ax) while allowing their ecosystem around CCX fall to the wayside despite not having a standards based equivalent to 100% of those components (DTPC anyone?).

Fortinet (http://fortinet.com/, @Fortinet)

Fortinet (nee: Meru) has always been intriguing to me. If there is a dark horse in the Wi-Fi space, this is it. Out of left field, some strange security company acquired ‘those SCA guys’ which raised more than a few eyebrows in the industry. I’m not super passionate about firewalls so when someone touts that their strong suit is plopping some security stuff onto an already delicate Wi-Fi ecosystem, I get nervous. I’d love to see what Fortinet is doing on the SCA front (other than the occasional corner case deployment). How are you fostering the technology that made Meru, Meru? If you’re going to be the one exception in the CWNP curriculum, own that. Embrace it, get the delegates to see what makes it special. Get into the nuts and bolts of how it works, what makes it tick. Get your radio firmware developer into the room and nerd out with us for a bit. Don’t be afraid to put that unpolished guy on stage that only knows protocol. We love that kind of stuff.

Mist (http://mist.com, @MistSystems)

Mist is on the short list of Wi-Fi only players that I suspect will be acquired soon. Between them and AeroHive, there aren’t many players left and to be fair, Mist came out of nowhere when Cisco ‘spun out’ (my speculation) the previous owners of the AireOS legacy. They claimed virtual BLE was the next big thing, now it’s AI driven Wi-Fi – what’s next? Do they realize that the ‘heritage’ that they claim ownership of has turned off more people than it’s attracted? When someone claims to be at the helm of Cisco Wi-Fi during the Meraki acquisition, or to have the father of controllers (and RRM) in the drivers seat, how is that a compelling story when so many of todays woes are centered around those two topics? I’d like to hear how Mist has those people at the helm, but how they’re not destined to repeat the past. Mist claims to have an AI driven interface but fails to answer some pretty plain english queries. Tell me how Mist is better. How the AI is not just a bunch of if statements. Burning Man Wi-Fi, I hope not!

NETSCOUT (http://www.netscout.com, @NETSCOUT)

NETSCOUT (or is it netscout or NetScout?) has long held the mantle of go to wired insight products and only recently entered into the Wi-Fi foray with the Fluke (nee: AirMagnet) acquisition. They inherited an impressive product in the AirCheck G2, but also a legacy of tools that are, quite frankly, stale. What is next for the G2? Many of us in the industry love our hulk green Wi-Fi diagnostics tool and the G2 v2 additions were welcome. Is there enough left in the AirCheck to hope for a v3? I’d love to see a cleaner picture about link-live and how it plays a role in the beloved AirCheck G2. I’d love to hear a definitive story on the likes of AirMagnet Survey Pro, Wi-Fi Analyzer, Spectrum XT – all of which are *very* stale. Let’s put these to bed or make something of them that the industry can use.

nyansa (http://www.nyansa.com, @Nyansa)

nyansa has been that strange analytics company with the funny name that promises to fix all of our ails through machine learning and comparative analytics. They’re doing some neat things with ‘just a bunch of flows’, but is it enough? It seems like everyone is jumping on the analytics bandwagon now a days, but with the hefty price tag for a point-in-time resolution product, it feels somewhat estranged. Do you know what happens when your help desk has 9 dashboards all with different data in it, and you try to aggregate and correlate it into a meaningful dashboard? Your help desk now has 10 dashboards. I’d love to see why your data is better (of course), but tell me how it gets rid of data I don’t use today, and tell me how it does it at a price point that makes it a no brainer.

Dear reader, what do you want to see? Feel free to reach out to me by comment, or privately, or on twitter before or during the event and I’ll make sure you get a response. Till then, see you at MFD3 on September 12 through the 14th – make sure to tune in at: http://techfieldday.com/event/mfd3/



from
https://sc-wifi.com/2018/08/30/management-frame-detection/

Wednesday, August 29, 2018

Friday, August 24, 2018

Thursday, August 23, 2018

Why the DNC Thought a Phishing Test Was a Real Attack

The Democratic National Committee now says a fraudulent voter data website it found was evidence of an unauthorized test organized by Michigan Democrats.

from
https://www.wired.com/story/dnc-phishing-test-votebuilder

A Monitor’s Ultrasonic Sounds Can Reveal What’s on the Screen

Researchers have demonstrated that they can discern individual letters on a display based only on the ultrasonic whine it emits.

from
https://www.wired.com/story/monitor-ultrasonic-sounds-reveal-content-side-channel

Sunday, August 19, 2018

Friday, August 17, 2018

Taking Away John Brennan's Clearance Threatens National Security

When Trump strips a former CIA director's security clearance, the impact is more than just symbolic.

from
https://www.wired.com/story/john-brennan-security-clearance-trump

A Bot Panic Hits Amazon Mechanical Turk

Concerned social scientists turned their analytical skills onto one of their most widely used research tools this week: Amazon's Mechanical Turk.

from
https://www.wired.com/story/amazon-mechanical-turk-bot-panic

Thursday, August 16, 2018

Imposter 'Fortnite' Android Apps Are Already Spreading Malware

New analysis from mobile security firm Lookout shows that malware authors are taking full advantage of 'Fortnite' ditching the Google Play Store.

from
https://www.wired.com/story/imposter-fortnite-android-apps-already-spreading-malware

Saving Lives With Tech Amid Syria’s Endless Civil War

A band of activist-entrepreneurs is building a sensor network to warn when and where air strikes will hit—a constant threat under Bashar al-Assad's regime.

from
https://www.wired.com/story/syria-civil-war-hala-sentry

Wednesday, August 15, 2018

Why Facebook Enlisted This Research Lab to Track Its Trolls

What can the 14-person Digital Forensics Research Lab discover about fake news on Facebook that the billion-dollar company doesn't already know?

from
https://www.wired.com/story/facebook-enlists-dfrlab-track-trolls

Tuesday, August 14, 2018

Monday, August 13, 2018

Sunday, August 12, 2018

Fax Machines Are Still Everywhere, and Wildly Insecure

Researchers have demonstrated that sending a single malicious fax is all it takes to break into a network.

from
https://www.wired.com/story/fax-machine-vulnerabilities

To Identify a Hacker, Treat Them Like a Burglar

A preliminary study shows that hackers penetrate systems in unique, documentable ways—just like criminals in the physical world.

from
https://www.wired.com/story/case-linkage-hacker-attribution-cybersecurity

A Clever Android Hack Takes Advantage of Sloppy Storage

The so-called man in the disk attack uses Android's permissive external storage to wreak havoc on devices.

from
https://www.wired.com/story/android-hack-external-storage-man-in-the-disk

Hackers Turned an Amazon Echo Into a Spy Bug

Researchers found they could turn the smart speakers into surveillance devices—if they could get their own attack tool on the same Wi-Fi.

from
https://www.wired.com/story/hackers-turn-amazon-echo-into-spy-bug

Invisible Mouse Clicks Let Hackers Burrow Deep into MacOS

A former NSA hacker finds a new way malware can take control of a Mac's mouse for a powerful intrusion technique.

from
https://www.wired.com/story/invisible-mouse-clicks-hack-macos

Police Departments Need to Stop Posting Mugshots on Twitter

Opinion: When police departments post photos of protestors on social media, it puts them at risk of harassment, or worse.

from
https://www.wired.com/story/opinion-police-should-stop-doxxing-protestors

Friday, August 10, 2018

At DefCon, the Biggest Election Threat Is Lack of Funding

While hackers at the DefCon security conference dismantle voting machines, officials stress the need for means to act on the results.

from
https://www.wired.com/story/defcon-election-threat-funding

A Tweet About Hacking During Defcon Gets a Google Engineer in Trouble

Matt Linton says he was asked to leave Caesars Palace Thursday night after a tweet about an “attack” was reported to the police.

from
https://www.wired.com/story/defcon-tweet-about-hacking-gets-engineer-trouble

Millions of Android Devices Are Vulnerable Out of the Box

Android smartphones from Asus, LG, Essential, and ZTE are the focus of a new analysis about risks from firmware bugs introduced by manufacturers and carriers.

from
https://www.wired.com/story/android-smartphones-vulnerable-out-of-the-box

Crestron Touchscreens Could Spy on Hotel Rooms and Meetings

The technology company Crestron makes touchscreen panels and other equipment for places like conference rooms, which a researcher found can be turned into hidden microphones and webcams.

from
https://www.wired.com/story/crestron-touchscreens-could-spy-on-hotel-rooms-and-meetings

Machine Learning Can Identify the Authors of Anonymous Code

Researchers have repeatedly shown that writing samples, even those in artificial languages, contain a unique fingerprint that's hard to hide.

from
https://www.wired.com/story/machine-learning-identify-anonymous-code

Thursday, August 9, 2018

Bugs in Mobile Credit Card Readers Could Expose Buyers

Card readers used by popular companies like Square and PayPal have several security flaws that could result in customers getting majorly ripped off.

from
https://www.wired.com/story/bugs-in-mobile-credit-card-readers-could-leave-buyers-exposed

Hacking a Brand New Mac Remotely, Right Out of the Box

Researchers found a way to compromise a Mac the first time it connects to Wi-Fi, potentially putting scores of enterprise customers at risk.

from
https://www.wired.com/story/mac-remote-hack-wifi-enterprise

Smartphone Voting Is Happening, But No One Knows If It's Safe

Online voting has major security flaws, and experts are concerned that Voatz, the platform West Virginia will use this midterm election, doesn't solve them.

from
https://www.wired.com/story/smartphone-voting-is-happening-west-virginia

A New Pacemaker Hack Puts Malware Directly On the Device

Researchers at the Black Hat security conference will demonstrate a new pacemaker-hacking technique that can add or withhold shocks at will.

from
https://www.wired.com/story/pacemaker-hack-malware-black-hat

The Sensors That Power Smart Cities Are a Hacker's Dream

The IoT security crisis is playing out on a macro scale too, putting critical infrastructure at risk.

from
https://www.wired.com/story/sensor-hubs-smart-cities-vulnerabilities-hacks

Wednesday, August 8, 2018

Sunday, August 5, 2018

Thursday, August 2, 2018

The DNC Enlists Kids in Its Fight Against Hackers

The Democratic National Committee will award $500 to the child who comes up with the best defensive strategy for state election websites at Def Con next week.

from
https://www.wired.com/story/dnc-enlists-kids-in-fight-against-hackers-elections

Wednesday, August 1, 2018