259 Fairport Village Landing, Fairport, NY 14450585-377-8910info@campbellnetsolutions.com

Blog

What is 5G? 1Gbps-plus wireless to enable mobile-only networking

What is 5G? 1Gbps-plus wireless to enable mobile-only networking

How soon is truly high speed wireless going to available to the end user and will it actually be enough to fill the gap?

Click here to view original web page at www.networkworld.com

The next step in the evolution of wireless WAN communications – known as 5G – is about to hit the front pages, and for good reason: it will complete the evolution of cellular from wireline augmentation to wireline replacement, and strategically from mobile-first to mobile-only. Even though at its core 5G is more about evolution than revolution, it’s not too early to start least basic planning to understanding how 5G will fit into and benefit IT plans across organizations of all sizes, industries and missions. 5G will of course provide end-users with the additional throughput, capacity, and other elements to address the continuing and dramatic growth in geographic availability, user base, range of subscriber devices, demand for capacity, and application requirements, but will also and equally importantly enable carriers, operators, and service providers to benefit from new opportunities in overall strategy, service offerings, and broadened marketplace presence. This article explores the technologies and market drivers behind 5G, with an emphasis on what 5G means to enterprise and organizational IT.

Read More
Even weak hackers can pull off a password reset MitM attack via account registration

Even weak hackers can pull off a password reset MitM attack via account registration

We talk a lot about network security here and it’s articles like these that make it worth it. If even a weak hacker can reset your password and access your email, your computer or your network, imagine what someone with some experience and solid chops could do. Make sure that you’re protected with the right kind of network security systems to do your absolute best to avoid the fallout from these types of attacks. Don’t know what you should be looking for? Give us a call and we’ll help you find the best options for your organization.

Credit: Thinkstock At the IEEE Symposium on Security and Privacy 2017, researchers from the College of Management Academic Studies in Israel presented an interesting paper on bad password reset processes, “The Password Reset MitM Attack” ( pdf ). It explains how a weak attacker could take over accounts by exploiting vulnerabilities in password reset procedures. They dubbed the attack: password reset man-in-the-middle (PRMitM). The researchers said Google is “extremely vulnerable” to PRMitM, but Facebook, Yahoo, LinkedIn, Yandex and other sites and email services are also vulnerable as well as mobile apps like Whatsapp, Snapchat and Telegram. To pull off a password reset man-in-the-middle, an attacker only needs to setup a website that requires users to register for the site in order to access whatever bait the site is using; it might be free services, free software, or some other freebie that can only be downloaded by logging in. The registration process may ask for differing bits of basic information, but as soon as a victim enters his email address, the automated attack can begin. The attacker goes to the specified email provider or site and starts the “forgot my password” process. If a CAPTHCA challenge is presented, the attacker […]

Read More
DHS and FBI issue alert about North Korean 'Hidden Cobra' hackers

DHS and FBI issue alert about North Korean ‘Hidden Cobra’ hackers

With so many security risks out there today, we think it’s good to keep you up to date on the latest threats that we come across. If you’re a subscriber to Network World then you’ve probably heard about this but, if not, take a look, stay vigilant and make sure to keep your network security protocols up to date!


Credit: REUTERS/North Korea’s Korean Central News Agency (KCNA) Watch out for attacks by Hidden Cobra, aka North Korean government hackers, the DHS and the FBI warned in a joint technical alert. The US government didn’t tiptoe around the issue, instead pointing the finger of blame at North Korea for a series of cyberattacks dating back to 2009. Who the heck is Hidden Cobra? You probably already know about these cyber actors who are usually referred to as the Lazarus Group. Back in 2014 when the hackers targeted Sony Pictures Entertainment, the group was publicly referring to itself as Guardians of the Peace . In the alert published by US-CERT yesterday, Homeland Security and the FBI released technical details about the tools which “cyber actors of the North Korean government” have used “to target the media, aerospace, financial, and critical infrastructure sectors in the United States and globally.” The Hidden Cobra group has been busy targeting victims for the last eight years. Malicious tools in their arsenal include DDoS botnets, keyloggers, RATs (remote access tools) and wiper malware. The group tends to target machines running old, unsupported versions of Microsoft Windows. It has also exploited Adobe Flash Player vulnerabilities and […]

Read More