RFGlobalnet has an article about a possible Wifi virus which propagates from one AP (access point) to another.
The University of Liverpool has set up a theoretical infection from one Wifi to another.
If a wifi system (AP) does not have good enough encryption setup, with a sophisticated password this attack could occur.
And Anti-virus programs will not protect.
The problem is that the danger has only been discovered, which means the nefarious methods are not even devised yet.
Keep you Wifi router correctly configured. Contact us for a remote Alpha scan.
Why perform a network vulnerability assessment or review?
because there are certain individuals that will take any weakness in your computers and networks (firewalls, switches) and exploit it to their own ends.
What can an enterprising evil hacker do? Minimally use your computers and networks that you have bought and paid for to attack other machines.
Besides using your resources, the evil hacker can steal your data, your customer information, anything that can be pieced together to be sold on the criminal market.
To give an example of hacker prowess and ingenuity: the Cap’n Crunch whistle for example There were these whistles in Cap’n Crunch cartons, and they happened to whistle at 2600Hz frequency
Story at jetcityorange.com
Before the phone systems were run by digital computers, the analog systems could be fooled in giving unlimited calls (long distance etc) at payphones.
I know it is stealing and a bad ethical thing, but look at the pure “hacking” ingenuity of the action finding of a whistle in a box, using it in a payphone and then trying various methods to steal calls.
Today’s hackers are just as ingenious with many different types of attacks.
After upgrading check for new services as the Internet Storm Center noted after a firewall operator noted new streaming data coming to/through firewall.
Upgrading the NAS server caused a media streaming service to turn on.
And that is how it starts. After an upgrade some months ago a service is turned on, even though one does not notice.
Then some time goes by and a vulnerability opens within the system.
Now the hackers can target the system.
Check your systems with Alpha or Sigma(Σ)
Patch your Google Chrome –
Why would a Google Chrome vulnerability be important? because if you happen to bump into a nefarious website
(unbeknown to you) it will affect your Google Chrome and then little by little the hacker will gain more information.
Pretty soon there will be open ports that you may not know about and those ports are “phoning home” to the master.
Scan your systems(with A or Σ) to see if you have rogue applications on your systems.
We are all busy – the department is smaller, as we lost Jim, he retired. John was fired in the last layoffs. But what happened – we soldiered on. We have gotten new servers installed, systems retired taught the users a new program. It is as if we had Jim and John still here.
But we missed leaving a program on one of the servers which did not get patched. So now the program is vulnerable – and it is only as matter of time before a person interested in penetrating systems for fun or profit will abuse the system in ways unknown.
Incompetence – no unknown competence
how good are your sys admins?
are your programmers developing secure websites?
Get your systems scanned – you don’t know what is going on. We can scan and review.