Symantec Threat Intelligence researchers have confirmed the suspicious attacks uncovered by Jighi as "real targeted attacks on banks and other financial institutions in several West Africa countries by cyber criminals " employing a range of commodity malware - readily available in cyber underground - and living off the land tools that allow them to hide [...]
Insider fraud in the banking industry: What if we could help you prevent, detect and respond to insider fraud?
An insider threat is a malicious hacker (also called a cracker or a black hat) who is an employee or officer of a business, institution, or agency. The term can also apply to an outside person who poses as an employee or officer by obtaining false credentials. The hacker obtains access to the computer systems [...]
Wi-Fi / WLAN / 802.11 channels, their channel frequencies and bandwidth allocations around the globe, spectral mask and summary of which channels can be used together for WLAN solutions. The IEEE 802.11 Wi-Fi / WLAN standards set the attributes for the different channels that may be used. These attributes enable different Wi-Fi modules to talk [...]
Remote Authentication Dial-In User Service (RADIUS) is commonly used to provide centralized authentication, authorization, and accounting for dial-up, virtual private network, and, more recently, wireless network access. This article provides an overview of RADIUS and the Extensible Authentication Protocol (EAP) and discusses how to minimize or resolve various security issues of the RADIUS protocol using [...]
When building your wireless network some basic installation techniques and rules must be followed to ensure optimal performance. The bullets below outline some of the basic steps that are required for a successful installation.