Showing posts with label public WiFi. Show all posts
Showing posts with label public WiFi. Show all posts

What College Students Need to Know About Password Attacks

Welcome to Cyber Threats 101! This is the fifth chapter in our A Busy College Student’s Guide to Online Security.  We’ll begin by defining what are password attacks and share expert tips on how to avoid becoming a victim to these attacks.

What are password attacks?

Password attacks are methods that take advantage of stolen, weak and/or reused passwords used to protect online accounts. In fact, 81 percent of hacking-related breaches in 2016 was the result of an attacker leveraging stolen and/or weak passwords.
Hackers can use one or more strategies to “guess” or crack encrypted passwords, including brute force attacks, dictionary attacks, and keyloggers. Before we get into these attacks, you must first know what encryption is.

What is encryption?

Encryption is the process of encoding messages or information in such a way that only authorized parties can read it. It transforms data that you send across the Internet into a format which is only readable when in possession of a decryption key, which provides the code to decipher the encryption.

If you want extra credit, you can learn more about encryption here.

What are brute force attacks?

Brute Force Attacks take a “try-try again” approach to guess password possibilities using automation software. Starting with one-digit passwords, the program will continue to guess longer combinations of letters, numbers, and symbols.
To get a better idea of how brute force attacks work, take a look at this short video from Lynda.com:

What are dictionary attacks?

Dictionary Attacks are based on the idea that we love to use names, places, sports teams, slang, etc. in our passwords. This method also uses automation software to guess different password combinations based on commonly used words that could be found in the dictionary.

What are keyloggers?

Keyloggers are malicious programs hackers implant on a target’s computer system–commonly through phishing emails–and are used to track and record every keystroke you make. It can record passwords, social security numbers, phone numbers, and even your credit card information.

Why shouldn’t I reuse a password on multiple accounts?

You should avoid reusing the same password on multiple accounts because hackers are known to use stolen or weak passwords from a massive data breach or from a password attack to deface your public profiles, commit identity fraud, steal your financial information, or send malicious messages or emails under your name.
Learn from the mistake of Facebook CEO Mark Zuckerberg who’s LinkedIn credentials were compromised in a massive data breach from 2012, which lead to a hacker group also compromising his Pinterest and Twitter pages; not to mention his password was “dadada“.

How do hackers use your stolen or weak password? Learn how “credential stuffing” attacks are used to exploit reused passwords

So how do I create a strong password?

Here are 5 tips to help you create a strong password:
  • Create a password that is–at a minimum–8 characters long. Ideally, your password should be between 12-15 characters.
  • Create a memorable, yet complex password by using a password mnemonic or a passphrase. You can start with a phrase, sentence, song lyric, etc. that is meaningful to you, but wouldn’t make sense to an automated computer program. You can also add a few numbers and special symbols for complexity.
  • Use a mix of case-sensitive letters, numbers, and symbols, but you won’t get away with replacing an “S” with a “$” or changing an “A” to “@”. In reality, hackers and automated password attack programs are already one step ahead of you and can easily pick up on these patterns.
  • Struggling to remember your new password? Write down a hint–not your password–that will jog your memory, but will be meaningless to anyone else. Then, keep it in a safe place.
  • Pro Tip: Use a password generator tool to create a strong password and then store it in a password manager like Dashlane!

WBA: Wi-Fi is part of 5G, and more Hotspot 2.0 is on the way



To hear the Wireless Broadband Alliance (WBA) tell it, there’s no doubt about it: Wi-Fi will be a key part of 5G in the years to come.

“The way I see it is things are converging and they’re converging very rapidly,” said JR Wilson, WBA chairman and vice president of Partnerships & Alliances at AT&T.
802.11ax is going to be part of the 5G standards, and although a couple years ago Wilson might have had to convince his colleagues about Wi-Fi being part of 5G, “I don’t think I’ve got to convince anyone anymore,” he said.

In fact, it’s not going to matter whether it’s Wi-Fi, cellular, LTE-M or any other access technology. “It’s really going to be just about how do you deliver an overall experience and that experience being very seamless and how all those different air interfaces operate together and how you go about integrating them,” he told FierceWirelessTech.
Of course, that means the WBA is working closely with 3GPP, IEEE, the Wi-Fi Alliance, GSMA and all those bodies, including the Small Cell Forum. In the next couple of years, given the accelerated rate of convergence, “I think we’re going to have to work even closer with them,” he said.

The WBA has a lot on its plate: In the next few years, it’s going to continue working on improving interoperability, provisioning and authentication, all the while being mindful of security and privacy issues. Once Wi-Fi is integrated into the 5G network and it all looks like one system to the customer, then it will be about managing the traffic across the converged ecosystem.

The vast majority of AT&T’s Wi-Fi network is Hotspot 2.0, and the good news is that a lot of other companies are realizing the benefit of having Hotspot 2.0 in their network. Hotspot 2.0 is designed to make Wi-Fi roaming as seamless and simple as cellular roaming, and the more companies that deploy it, the better for the whole Wi-Fi ecosystem.
Given the price compression in the wireless industry and the unlicensed nature of Wi-Fi, the business case for Hotspot 2.0 is only going to get stronger, Wilson predicts. That’s because unlicensed technologies can be deployed at a lower cost while maintaining the quality of service, and the companies with the best cost structures are going to prevail.
“You’re going to see a lot more companies start to utilize Hotspot 2.0 as part of their overall network strategy,” he said.




Naturally, AT&T is interested in boosting its Wi-Fi footprint in more venues. Last year, Boingo announced that an unnamed “tier 1 carrier” had joined Sprint as a Boingo Wi-Fi offloading customer. Sources told FierceWireless at the time that the second carrier was most likely AT&T.

Wilson said that AT&T and Boingo have been working together for years, and the two companies have a good relationship. However, he declined to comment on any specifics.
As the exclusive carrier in the early days of the iPhone, AT&T’s traffic unexpectedly skyrocketed, taxing the cellular network and frustrating customers. That’s when it embraced Wi-Fi in a big way. Putting more traffic onto Wi-Fi led to more usage on both the Wi-Fi and cellular networks.

AT&T has seen accelerated video demand across its entire business. Of course, everyone naturally thinks about consumer-based video services, and that segment is certainly growing at a rapid pace.

“Similarly, we are seeing more and more video-driven applications in the enterprise sector,” he said. AT&T saw that play out in the fleet space. A couple years ago, it was largely about tracking vehicles and trucks around the globe. There has been a progression of IoT based services; now, the fleet business is using video in new ways, putting cameras in the cab or monitoring high-value cargo. That’s driving tremendous usage for both cellular and Wi-Fi, Wilson said, with video being used in ways nobody thought much about even a couple years ago.




Amazon wants to let strangers into your home 👀

Fbcaba99 5520 4d23 a354 23f17893610a?auto=format
This morning Bezos and team announced Amazon Key, an in-home camera and smart lock. As expected, the news was met with hugs and disgust.

“Hell no. There’s no way I’m letting a stranger into my home.” – 😐 Person on the Internet.

Regardless of your position, Amazon’s chess move to get a key to your door is brilliant. This gives the “A” in FANG (Facebook, Amazon, Netflix, and Google) a gateway to in-home services, including:

🍎 Grocery delivery
🐶 Dog walking
✨ House cleaning
👵 Elderly care
🛠 Home repairs

Amazon’s playing a very long game. The seeds planted today will enable a new wave of exciting (and society altering) automation as robots clean your home, walk your dog, and deliver eggs.

If you’re looking for a security camera but not ready to give strangers a key to your home, check out this $19.99 smart camera. It’s #3 on Product Hunt today.
AMAZON KEY 🔑

WPA2 security flaw puts almost every Wi-Fi device at risk of hijack, eavesdropping


A security protocol at the heart of most modern Wi-Fi devices, including computers, phones, and routers, has been broken, putting almost every wireless-enabled device at risk of attack.
The bug, known as "KRACK" for Key Reinstallation Attack, exposes a fundamental flaw in WPA2, a common protocol used in securing most modern wireless networks. Mathy Vanhoef, a computer security academic, who found the flaw, said the weakness lies in the protocol's four-way handshake, which securely allows new devices with a pre-shared password to join the network.
That weakness can, at its worst, allow an attacker to decrypt network traffic from a WPA2-enabled device, hijack connections, and inject content into the traffic stream.
In other words: this flaw, if exploited, gives an attacker a skeleton key to access any WPA2 network without a password. Once they're in, they can eavesdrop on your network traffic.
The bug represents a complete breakdown of the WPA2 protocol, for both personal and enterprise devices -- putting every supported device at risk.

"If your device supports Wi-Fi, it is most likely affected," said Vanhoef, on his website.
But because Vanhoef hasn't released any proof-of-concept exploit code, there's little risk of immediate or widespread attacks.
News of the vulnerability was later confirmed on Monday by US Homeland Security's cyber-emergency unit US-CERT, which about two months ago had confidentially warned vendors and experts of the bug, ZDNet has learned.
The warning came at around the time of the Black Hat security conference, when Vanhoef presented a talk on networking protocols, with a focus on the Wi-Fi handshake that authenticates a user joining a network.
The cyber-emergency unit has since reserved ten common vulnerabilities and exposures (CVE) records for the various vulnerabilities.
Cisco, Intel, Juniper, Samsung, and Toshiba are among the companies affected.
At its heart, the flaw is found in the cryptographic nonce, a randomly generated number that's used only once to prevent replay attacks, in which a hacker impersonates a user who was legitimately authenticated.
In this case, an attacker can trick a victim into reinstalling a key that's already in use. Reusing the nonce can allow an adversary to attack the encryption by replaying, decrypting, or forging packets.
Windows and latest versions of Apple's iOS are largely immune from the flaws, according to security researcher Kevin Beaumont, in a blog post.
However, Vanhoef said the security issue is "exceptionally devastating" for Android 6.0 Marshmallow and above.


via zdnet

Here is every patch for KRACK Wi-Fi attack available right now



Monday morning was not a great time to be an IT admin, with the public release of a bug which allowed WPA2 security to be broken.

As reported previously by ZDNet, the bug, dubbed "KRACK" -- which stands for Key Reinstallation Attack -- is at heart a fundamental flaw in the way Wi-Fi Protected Access II (WPA2) operates.
The security protocol, an upgrade from WPA, is used to protect and secure communications between everything from our routers, mobile devices, and Internet of Things (IoT) devices, but there is an issue in the system's four-way handshake which permits devices with a pre-shared password to join a network.
According to security researcher Mathy Vanhoef, who discovered the flaw, threat actors can leverage the vulnerability to decrypt traffic, hijack connections, perform man-in-the-middle attacks (MiTM) and eavesdrop on communication sent from a WPA2-enabled device.
US-CERT has known of the bug for some months and informed vendors ahead of the public disclosure to give them time to prepare patches and prevent the exploit from being utilized in the wild -- of which there are no current reports of this bug being harnessed by cyberattackers.
The bug is present in WPA2's cryptographic nonce and can be utilized to dupe a connected party into reinstalling a key which is already in use. While the nonce is meant to prevent replay attacks, in this case, attackers are then given the opportunity to replay, decrypt, or forge packets.
In general, Windows and newer versions of iOS are unaffected, but the bug can have a serious impact on Android version 6.0 Marshmallow and above.
The attack could also be devastating for IoT devices, as vendors often fail to implement acceptable security standards or update systems in the supply chain, which has already led to millions of vulnerable and unpatched IoT devices being exposed for use by botnets.
The vulnerability does not mean the world of WPA2 has come crumbling down, but it is up to vendors to mitigate the issues this may cause.
In total, 10 CVE numbers have been preserved to describe the vulnerability and its impact, and according to the US Department of Homeland Security (DHS), the main affected vendors are Aruba, Cisco, Espressif Systems, Fortinet, the FreeBSD Project, HostAP, Intel, Juniper Networks, Microchip Technology, Red Hat, Samsung, various units of Toshiba and Ubiquiti Networks.
So who is on top of the game?
Aruba: Aruba has been quick off the mark with a security advisory and patches available for download for ArubaOS, Aruba Instant, Clarity Engine and other software impacted by the bug.
Cisco: The company is currently investigating exactly which products are impacted by KRACK, but says that "multiple Cisco wireless products are affected by these vulnerabilities."
"Cisco is aware of the industry-wide vulnerabilities affecting Wi-Fi Protected Access protocol standards," a Cisco spokesperson told ZDNet. "When issues such as this arise, we put the security of our customers first and ensure they have the information they need to best protect their networks. Cisco PSIRT has issued a security advisory to provide relevant detail about the issue, noting which Cisco products may be affected and subsequently may require customer attention.
"Fixes are already available for select Cisco products, and we will continue publishing additional software fixes for affected products as they become available."
In other words, some patches are available, but others are pending the investigation.
Espressif Systems: The Chinese vendor has begun patching its chipsets, namely ESP-IDF and ESP8266 versions, with Arduino ESP32 next on the cards for a fix.
Fortinet: At the time of writing there was no official advisory, but based on Fortinet's support forum, it appears that FortiAP 5.6.1 is no longer vulnerable to most of the CVEs linked to the attack, but the latest branch, 5.4.3, may still be impacted. Firmware updates are expected.
FreeBSD Project: There is no official response at the time of writing.
Intel: Intel has released a security advisory listing updated Wi-Fi drives and patches for affected chipsets, as well as Intel Active Management Technology, which is used by system manufacturers.
Linux: As noted on Charged, a patch is a patch is already available and Debian builds can patch now, while OpenBSD was fixed back in July.
The WiFi Standard: A fix is available for vendors but not directly for end users.
Mikrotik: The vendor has already released patches which fix the vulnerablities.
Google: Google told The Verge that the company is "aware of the issue, and we will be patching any affected devices in the coming weeks."
AVM: This company may not be taking the issue seriously enough, as due to its "limited attack vector," despite being aware of the issue, will not be issuing security fixes "unless necessary."
OpenBSD: Patches are now available.
Microsoft: While Windows machines are generally considered safe, the Redmond giant isn't taking any chances and has released a security fix available through automatic updates.
Netgear: Netgear has released fixes for some router hardware. The full list can be found here.
Ubiquiti Networks: A new firmware release, version 3.9.3.7537, protects users against the attack.
Check back as we update this story.


via zdnet

How to Get WiFi on Most Major Airlines

Your Guide to Getting Wi-Fi on Most Major Airlines


Being able to browse Facebook, email and watch Netflix on flights has become more important than ever. But what's the best way to get Wi-Fi one planes? We had some experts break down how to get the best deals before you take off.

One company travel bloggers Chris McGinnis and Edward Pizarello suggested travelers familiarize themselves with is Gogo, an in-flight Wifi provider to American, Alaska, Delta, Virgin America, and United Airlines. "The most important thing a frequent traveler can do is to buy Gogo passes on the ground instead of waiting until getting on the plane. Buying a day pass in advance costs just $19 while buying a full flight pass on a [transcontinental] flight can cost up to $50," McGinnis says.

Gogo also offers a subscription plan for international flights at $69.95 a month. For domestic flights, they offer a $49.95 a month subscription plan as well. However, you'll need to fly more than two days each month to make the monthly cost for those plans worth it.

Being able to browse Facebook, email and watch Netflix on flights has become more important than ever. But what's the best way to get Wi-Fi one planes? We had some experts break down how to get the best deals before you take off.

One company travel bloggers Chris McGinnis and Edward Pizarello suggested travelers familiarize themselves with is Gogo, an in-flight Wifi provider to American, Alaska, Delta, Virgin America, and United Airlines. "The most important thing a frequent traveler can do is to buy Gogo passes on the ground instead of waiting until getting on the plane. Buying a day pass in advance costs just $19 while buying a full flight pass on a [transcontinental] flight can cost up to $50," McGinnis says.

Gogo also offers a subscription plan for international flights at $69.95 a month. For domestic flights, they offer a $49.95 a month subscription plan as well. However, you'll need to fly more than two days each month to make the monthly cost for those plans worth it.

American Airlines

American Airlines offers a $16 day pass for domestic flights. However, Wi-Fi pricing for international American Airlines flights go up to $19, or $12 for two hours and $17 for four hours.

Passengers can also purchase a $7 one-hour pass from Gogo that works on American Airlines flights.

Wi-Fi is available on nearly all of their flights, according to their website. Pizzarello noted American Airlines uses Gogo and a few other providers to power their Wi-Fi. Most Gogo-powered Wi-Fi on American Airlines flights uses their older cell-tower technology, which provides about 9 Mbps for the entire aircraft. However, more of the airline's flights are getting upgraded to Gogo's newer satellite-powered service, which provides 15 Mbps per person.

Alaska Airlines

On Alaska Airlines flights, you can use Gogo's one hour or one-day passes. The airline also sells a $16 day pass and a pack of six 45-minute passes for $36. Alaska Airlines flights don't have Gogo's faster satellite-based 2kU service, but the airline announced it will start making upgrades in early 2018, according to Pizzarello.

Delta

Delta offers a $16 day pass for domestic prices as well as their own global day pass through Gogo for $28. Similar to American Airlines, Delta upgrading more of its in-flight Wi-Fi offerings to Gogo's satellite-based technology.

JetBlue

JetBlue provides free Wi-Fi service on all planes. McGinnis adds that it's satellite based (with a speed of 12 and 20 Mbps per person).

Southwest

Southwest has one of the most affordable paid-for plans at $8 a device per day. "The service is reasonably fast, though you can't stream movies from services like Netflix or Amazon Price," Pizzarello says. "They do offer movies for rent onboard at a price of $5 each."

United Airlines

United offers a range of packages, with options as small as 30 minutes of connectivity for roughly $4. They also offer full-flight passes for prices ranging from $8 to $20 per flight, Pizzarello says.

Pizzarello noted United's Wi-Fi offerings vary and they have a handful of different products. This also means that they don't offer any monthly pass options. According to Pizzarello, "the speeds are generally faster than American and Delta but slower than JetBlue's Fly-Fi service."

McGinnis said he's found United's service to be inexpensive, but unreliable. "When it works, it's great! Speedy and easy," McGinnis says. "But when it does not, its a real pain because it usually means inflight entertainment system is out, too."

Virgin America

Virgin American also uses Gogo's first generation Wi-Fi service. Like Alaska Airlines, they're beginning upgrades to the 2kU service in early 2018, according to Pizzarello. They also use ViaSat on some aircraft. You can buy a pass through Gogo if your plane uses its service for $19 for the day or $7 an hour. Service on ViaSat enabled planes ranges from $5 to $18, depending on the length of the flight. Monthly and annual Gogo subscription members can also use this service for free.


vias fortune