Office Centricity is Dead. Your Information Technology(IT) implementation and your strategic IT plans were fine until the coronavirus pandemic highlighted their shortcomings. We quickly discovered that most IT implementations lacked persistent secure access from home. Since March, cyber-attacks increased exponentially as a result of work-from-home (WFH) orders. Away from the office, their unsecured digital transactions [...]
Symantec Threat Intelligence researchers have confirmed the suspicious attacks uncovered by Jighi as "real targeted attacks on banks and other financial institutions in several West Africa countries by cyber criminals " employing a range of commodity malware - readily available in cyber underground - and living off the land tools that allow them to hide [...]
Insider fraud in the banking industry: What if we could help you prevent, detect and respond to insider fraud?
An insider threat is a malicious hacker (also called a cracker or a black hat) who is an employee or officer of a business, institution, or agency. The term can also apply to an outside person who poses as an employee or officer by obtaining false credentials. The hacker obtains access to the computer systems [...]
Wi-Fi / WLAN / 802.11 channels, their channel frequencies and bandwidth allocations around the globe, spectral mask and summary of which channels can be used together for WLAN solutions. The IEEE 802.11 Wi-Fi / WLAN standards set the attributes for the different channels that may be used. These attributes enable different Wi-Fi modules to talk [...]
Remote Authentication Dial-In User Service (RADIUS) is commonly used to provide centralized authentication, authorization, and accounting for dial-up, virtual private network, and, more recently, wireless network access. This article provides an overview of RADIUS and the Extensible Authentication Protocol (EAP) and discusses how to minimize or resolve various security issues of the RADIUS protocol using [...]