5 Reasons Every Company Should Have A Honeypot

While honeypots have been used widely by researchers to study the methods of attackers, they can be very useful to defenders as well. Here are five advantages that the digital sandboxes can bring to companies.

via 5 Reasons Every Company Should Have A Honeypot — Dark Reading.

Honeypots fill the gap, because attackers have a much more difficult time predicting their use and countering the defenses, Strand says. Because production honeypots are machines that no legitimate user should be accessing, they also have a low false positive rate.

Groundbreaking Results for High Performance Trading with FPGA and x86 Technologies

As market data enters the switch, the Ethernet frame is parsed serially as bits arrive, allowing partial information to be extracted and matched before the whole frame has been received.

Then, instead of waiting until the end of a potential triggering input packet, pre-emption is used to start sending the overhead part of a response which contains the Ethernet, IP, TCP and FIX headers. This allows completion of an outgoing order almost immediately after the end of the triggering market feed packet.

The overall effect is a dramatic reduction in latency to close to the minimum that is theoretically possible.

via Groundbreaking Results for High Performance Trading with FPGA and x86 Technologies | Low-Latency.com.

Wi-Fi sniffing lets researchers take social snapshots of crowds

Wi-Fi client devices can seek a wireless network to connect to through active or passive scanning for ‘beacons’ broadcast by access points. Smartphones typically use active scanning, which means they switch on their wireless radio for a brief period to send a probe request and receive information about networks within range. The operating systems of wireless devices can include a preferred network list (PNL), which incorporates some of the SSIDs of Wi-Fi networks the device has previously successfully connected to, and some devices will include this information in their probe requests.

via Wi-Fi sniffing lets researchers take social snapshots of crowds – Wi-Fi, security, mobility, smartphones – Security – Techworld.

Raspberry Pi as an Ad Blocking Access Point

This tutorial will show you how to use your Raspberry Pi as a WiFi access point that blocks ads by default for any devices using it. This is really neat in that it would work for your Android or iOS device, your Xbox 360, TiVo, laptop, and more without needing to customize any of those devices other than to use your Raspberry Pi as the access point for WiFi. Using an ad-blocker can be useful for conserving bandwidth, helping out low-power devices, or for keeping your sanity while browsing the web!

via Overview | Raspberry Pi as an Ad Blocking Access Point | Adafruit Learning System.

Five Indicators To Watch For On Your Networks

First, companies need to monitor the right logs, including data from firewalls, virtual private networking (VPN) appliances, Web proxies and DNS servers. Next, the security team must collect data on what “normal” looks like inside the company’s network. Third, analysts must identify the indicators of attacks in their log files. Finally, the security group must have a procedure for responding to incidents identified by log analysis.

via Five Indicators To Watch For On Your Networks — Dark Reading.

NASA aiming for moon again, this time from Va., to probe thinnest of atmospheres, lunar dust

Hitching a ride on LADEE is an experimental laser communication system designed to handle higher data rates than currently available. NASA hopes to eventually replace its traditional radio systems with laser communications, which uses less power and requires smaller transmitters and receivers, while providing lightning-fast bandwidth.

via NASA aiming for moon again, this time from Va., to probe thinnest of atmospheres, lunar dust – The Washington Post.

Toshiba has invented a quantum cryptography network that even the NSA can’t hack

A quantum network uses specially polarized photons to encode an encryption key—a very long series of numbers and letters that can unlock a digital file. The photons are then sent down a fiber optic cable until they reach their destination, a photon detector, which counts them, and delivers the key to the intended recipient. If the photons are interfered with, the individual packets of information are forever altered and the recipient can see the telltale signs of tampering.

via Toshiba has invented a quantum cryptography network that even the NSA can’t hack – Quartz.

Current quantum cryptography systems from companies like ID Quantique start at around $50,000, and only connect two parties at a time. “If up to 64 people can share a single photon detector than you can spread out those costs,” Shields said.

About Wireless Leiden

The Wireless Leiden Foundation has established an open, inexpensive, fast wireless network for Leiden and surrounding villages. It is an independent network, which technically links up seamlessly to the Internet, but can also be used for free local communication within the Leiden region. Wireless Leiden is a non-profit organisation, operating completely with professional volunteers and aiming at infrastructure and not services. All our software, technological and organisational knowledge is freely available to others under an open source license.

via About Wireless Leiden | Stichting Wireless Leiden.

ZMap · The Internet Scanner

ZMap is an open-source network scanner that enables researchers to easily perform Internet-wide network studies. With a single machine and a well provisioned network uplink, ZMap is capable of performing a complete scan of the IPv4 address space in under 45 minutes, approaching the theoretical limit of gigabit Ethernet.

ZMap can be used to study protocol adoption over time, monitor service availability, and help us better understand large systems distributed across the Internet.

via ZMap · The Internet Scanner.

Hacking and Rooting SOHO Home Routers

In a previous report, we released a list of SOHO router vulnerabiltiies and showed proof-of-concept (PoC) attack code for how to exploit them. For many of these routers, those PoCs operated through the main web-based interface. In this follow up study, we addressed only the extraneous, non-router services that were present on the routers. What we found was that of the 10 routers reviewed, all 10 could be compromised from the (wireless) LAN once a router had USB attached storage connected.

via Hacking and Rooting SOHO Home Routers.

This is hardly surprising.  Currently I only use SOHO routers as dumb wifi access points and that’s it.  I don’t know why anyone would want to make one of these cheaply built devices into some kind of NAS.