First time on my blog "WiFi Security?" Want to know more about WiFi Security? Need some fresh software to secure your WiFi connection?

Subscribe to blog updates by Email or RSS

Each week you will get a new post about WiFi Security. I promise you, my dear reader! Or you will unsubscribe :-)



Monday, May 3, 2010

Arbor Networks Offers Virtual Network Security Tool

Arbor Networks, whose technology detects abnormal network traffic flow, now offers its PeakFlow monitoring tool for use in virtualized environments. PeakFlow X Virtual 4.2 is the alternative to PeakFlow X software that monitors packet flow through network routers and switches, alerting system administrators if traffic spikes above normal patterns, such as in the case of a distributed denial of service (DDOS) attack. The virtual version of the software is designed to run in VMware's ESX and ESXi hypervisors.

PeakFlow SP was introduced in 2000, targeting telecommunications service providers such as Verizon, AT&T, British Telecom and others that operate vast global networks and also serve as Internet service providers (ISPs). The appliance sampled about one packet in 100,000 to extrapolate from there network traffic patterns. In 2006, Arbor introduced PeakFlow X, which was targeted at enterprises and sampled 100 percent of network traffic, said Tom Bienkowski, director of product marketing for Arbor Networks.

Increasingly, though, service providers are showing an interest in also using the enterprise version of PeakFlow as they become managed security service providers (MSSPs) to their customers, said Bienkowski. Frost & Sullivan estimates that the size of the global managed security service market will grow to about $2.5 billion in 2015, from about $1.5 billion this year. Offering the virtualized product makes providing that security more cost-effective for MSSPs. "The virtual version of the X products allows these service providers to deliver those managed services much more economically. It's much easier, there's less rack space -- all the advantages of being virtual," Bienkowski said.

DDOS attacks are growing in size and severity, he added. Arbor Networks' own analysis reports DDOS attacks in 2007 of as high as 40Gbps, up from just 10 Gbps in 2004, and the rise of cloud computing is only going to create richer targets for attacks and more opportunities for companies such as Arbor Networks, said Jennifer Pigg, an analyst with Yankee Group. "[In the cloud] there are things moving in and out of the network that you can't pin down the location for, you don't know where the resources are located so it becomes a real security vulnerability, and it becomes that much more difficult to trace where there is something like a denial of service attack," Pigg said. Arbor Networks can appeal to a large market of both ISPs and enterprises that are creating clouds for their own use or as a public cloud offering, Pigg added.

Arbor Networks competes against companies like Lancope, with its StealthWatch line of network monitoring technology, and Mazu Networks, whose Mazu Profiler software also does network behavioral analysis. But Pigg said there are other companies in the domain name system (DNS) space that also provide DDOS notification, such as Neustar and Nominum.

Source: networkcomputing.com


Like this post? Why not to Subscribe to WiFi Security news by Email for FREE

Why WiFi Security and encryption matter?

Recently there seems to be a never ending stream of information leaks percolating through the news. Several states mandate wireless networks implement encryption and the Federal government is looking at forcing companies to disclose information leaks to affected customers. Of course any information leak or unauthorized access to sensitive data on a personal or even worse business network may present a myriad of liability issues.

Wireless networks are often targeted and most of them are not up to the standard of security that is publicly available. Using no encryption leaves your network immediately open to attack. This means any third party can connect in to your network, discover resources like shared files or computers that are vulnerable and gain access. There is not much, if any legal protection afforded in this situation as the network is open.


WEP (wireless equivalent privacy) is an older standard that for its time was certainly better than no encryption, but these days it is not much more secure than leaving the network wide open. The reason is that there exist several fundamental flaws in the WEP algorithm that leave your network vulnerable, including, but not limited to:


  1. Passive attacks to decrypt traffic

  2. Active attacks to inject new traffic from unauthorized nodes

  3. Active attacks to decrypt traffic based on fooling the AP (access point)

  4. Dictionary-based attacks that may take some time, but allows full decryption of all network traffic



These attacks are simple to configure and can be implemented with off the shelf equipment, including many standard laptop configurations. Furthermore, WEP uses RC4 encryption, a weaker and older form of stream-based encryption that is easy for attackers to exploit because of its vulnerable key exchange mechanism and the lower grade cipher used.

Many routers are setup to use WEP encryption, even those supplied by Internet providers. If you are using WEP (or no encryption at all) it’s best to consider using WPA2 with AES encryption. This is the highest publicly available wireless encryption standard. If your router or wireless card does not support this standard now would be a good time to consider upgrading.

Source: arlingtonvacomputerrepair.com


Like this post? Why not to Subscribe to WiFi Security news by Email for FREE

HOWTO setup WiFi Security on your router and connect to your wireless network

This guide will show you how to put a security code on your wireless network so strangers can not access your Internet, how to connect to a secured wireless network. Router configuration addresses D-Link 192.168.0.1 Linksys 192.168.1.1 Belkin 192.168.2.1 Netgear 192.168.0.1



Source: articlemarks.com

Like this post? Why not to Subscribe to WiFi Security news by Email for FREE

White Paper - Modern Network Security: The Migration to Deep Packet Inspection

Where attacks like Smurf, Fraggle and the Ping of Death were the key threats in years past, now attacks such as "Microsoft IIS 5.0 printer ISAPI extension buffer overflow vulnerability" and "Unicode directory traversal" are more prevalent, albeit much less imaginatively named...

Read more in the white paper.

Download White Paper

Source: whitepapers.hackerjournals.com

Like this post? Why not to Subscribe to WiFi Security news by Email for FREE

Sunday, May 2, 2010

Texas Network Security Systems are Tighter Than a Biscuit

Network security is one of the most important factors to be considered while setting up a network at home or at the office. An unsecured network will result in loss of information and data. Network Security in Austin Texas plays a very important role to the people of Texas as their computers may be given a potential threat from the Internet.

More over cyber crimes are increasing tremendously these days which is to be considered as a matter of great importance. Austin Texas Network Security should be strengthened by all the computer users of Texas so that they can be safe about their data and information.

Most people in Texas do not still know what network security is and the dangers that can be caused by the security breach. Any one can get into the computer of an unsecured or unprotected network and can use the data or information that is available in the system.

If the Austin Texas Network Security is too weak then hackers can easily modify the data or even destroy the data present in the computer. Network Security in Austin Texas depends on the protection and the security of the network in which the computer is connected to.

Network security is basically not about updating programs in the system and rather it is removing the malware, spyware and other intruding programs that damage the capability of the system. Network Security in Austin Texas should be made available to all the people in the city and everyone should be aware of the potential dangers of an unsecured network.

Austin Texas Network Security comes into a role where the people of the city are working with an always on Internet connection where the chances of getting a security breach are high. With high speed Internet connections coming to reality people should be very much aware of the network security.

Every person in the city of Texas who has a system and which is connected to a network which can be a local area network or a wide area network should be very careful about his network. Austin Texas Network Security is used by the people only when their system is affected by a virus program or there has been a loss of data in their system.

Most companies forget the danger of an unsecured network which can result in a great loss to the company as the company secrets and their information can go destroyed without Network security in Austin Texas. If one system is affected by a virus which is connected to an unsecured network every person in that network has the chance of getting that virus very easily if Austin Texas Network Security not proper.

A malicious code can cause the whole system to crash without the knowledge of the user of the system if the Network security in Austin Texas is weak. The damage is very strong that even a bank’s network or an airline or any company in the city can be completely shut down due to poor Austin Texas Network Security.

The damages due to these are increasing every year and so the people should be careful about their computers and make sure it is secured while it is connected to a network.

Source: tech.yug.com


Like this post? Why not to Subscribe to WiFi Security news by Email for FREE