Thursday, 19 February 2009

Protect your mobile : anywhere, anytime !

Many endpoint security solutions protect laptops and remote client tools only when they are connected to the network, leaving these devices open to malicious attacks and data interception. Implementing a comprehensive approach to endpoint security can mitigate the risks of theft, malware, and other vulnerabilities to increase data protection and help your company avoid the consequences of information loss and leakage.

Same goes to stealing information while you are accessing your personal information from public hotspots what so called ” Evil Twin” attacks. In this scenario a hotspot user connects to the “Evil Twin” wireless access point, believing it to be a legitimate commercial hotspot. Once connected the hacker impersonates a legitimate hotspot, and records all information entered into the web page, which can include your passwords, emails or worse credit card information.

This concept is very similar to the email “phishing” scams, where a message is sent to users tricking them to enter confidential information, such as bank account information or other sensitive username and password combinations. The process of tricking someone to voluntarily provide confidential information has been used for years in a variety of forms; more generally it is known as “social engineering”.

Every wireless device that is Wi-Fi enabled actually makes the hacker’s job even easier. Every device continues to “probe” for access points it has been connected to in the past. If the Wireless Connection manager in Windows XP sees a legitimate SSID it will automatically re-connect to that access point. All the hacker has to do is give his soft AP a default SSID, such as “linksys”, “boingo”, “home” or “public” and the laptop will automatically establish a wireless connection without any required user action.

Protect your mobile : anywhere, anytime !

Many endpoint security solutions protect laptops and remote client tools only when they are connected to the network, leaving these devices open to malicious attacks and data interception. Implementing a comprehensive approach to endpoint security can mitigate the risks of theft, malware, and other vulnerabilities to increase data protection and help your company avoid the consequences of information loss and leakage.

Same goes to stealing information while you are accessing your personal information from public hotspots what so called ” Evil Twin” attacks. In this scenario a hotspot user connects to the “Evil Twin” wireless access point, believing it to be a legitimate commercial hotspot. Once connected the hacker impersonates a legitimate hotspot, and records all information entered into the web page, which can include your passwords, emails or worse credit card information.

This concept is very similar to the email “phishing” scams, where a message is sent to users tricking them to enter confidential information, such as bank account information or other sensitive username and password combinations. The process of tricking someone to voluntarily provide confidential information has been used for years in a variety of forms; more generally it is known as “social engineering”.

Every wireless device that is Wi-Fi enabled actually makes the hacker’s job even easier. Every device continues to “probe” for access points it has been connected to in the past. If the Wireless Connection manager in Windows XP sees a legitimate SSID it will automatically re-connect to that access point. All the hacker has to do is give his soft AP a default SSID, such as “linksys”, “boingo”, “home” or “public” and the laptop will automatically establish a wireless connection without any required user action.

Protect your mobile : anywhere, anytime !

Many endpoint security solutions protect laptops and remote client tools only when they are connected to the network, leaving these devices open to malicious attacks and data interception. Implementing a comprehensive approach to endpoint security can mitigate the risks of theft, malware, and other vulnerabilities to increase data protection and help your company avoid the consequences of information loss and leakage.

Same goes to stealing information while you are accessing your personal information from public hotspots what so called ” Evil Twin” attacks. In this scenario a hotspot user connects to the “Evil Twin” wireless access point, believing it to be a legitimate commercial hotspot. Once connected the hacker impersonates a legitimate hotspot, and records all information entered into the web page, which can include your passwords, emails or worse credit card information.

This concept is very similar to the email “phishing” scams, where a message is sent to users tricking them to enter confidential information, such as bank account information or other sensitive username and password combinations. The process of tricking someone to voluntarily provide confidential information has been used for years in a variety of forms; more generally it is known as “social engineering”.

Every wireless device that is Wi-Fi enabled actually makes the hacker’s job even easier. Every device continues to “probe” for access points it has been connected to in the past. If the Wireless Connection manager in Windows XP sees a legitimate SSID it will automatically re-connect to that access point. All the hacker has to do is give his soft AP a default SSID, such as “linksys”, “boingo”, “home” or “public” and the laptop will automatically establish a wireless connection without any required user action.

Monday, 16 February 2009

MWC 2009 : Thinkforward from Mobile World Congress, Barcelona


GSM Mobile World Congress 2009 has started since yesterday (16 February) in Barcelona. With all tha Mobile manufacturers deeply concern about the global economic ilness, they should take any advance proactive action towards excellent mobile solution. And the theme ” thinkforward” really suite to their this years target to achieve.

With 1300 exhibitors from whole around the world, the MWC2009 still shows their strength though facing the most challenging economical impact. They all coming away to Barcelona in order to share each other experience on the future mobile to the user.

Steve Ballmer (Microsoft), Chris DeWolfe (MySapce) are among the keynote speaker at the event. Over three days, The event will focus on creating business opportunities for innovators and promoting the innovation developments and opportunities through a number of exclusive initiatives:

A focused conference agenda featuring high-level speakers from across the operator, investment, vendor and mobile innovation communities Mobile Innovation EMEA tournament and Global Competition - “Pitch” presentations from cutting-edge, top innovators who will present their innovations to a panel of industry judges - Innovation Zone - an exhibition area in showcasing the latest applications, services and technological advancements from the world’s foremost innovators

MWC 2009 : Thinkforward from Mobile World Congress, Barcelona


GSM Mobile World Congress 2009 has started since yesterday (16 February) in Barcelona. With all tha Mobile manufacturers deeply concern about the global economic ilness, they should take any advance proactive action towards excellent mobile solution. And the theme ” thinkforward” really suite to their this years target to achieve.

With 1300 exhibitors from whole around the world, the MWC2009 still shows their strength though facing the most challenging economical impact. They all coming away to Barcelona in order to share each other experience on the future mobile to the user.

Steve Ballmer (Microsoft), Chris DeWolfe (MySapce) are among the keynote speaker at the event. Over three days, The event will focus on creating business opportunities for innovators and promoting the innovation developments and opportunities through a number of exclusive initiatives:

A focused conference agenda featuring high-level speakers from across the operator, investment, vendor and mobile innovation communities Mobile Innovation EMEA tournament and Global Competition - “Pitch” presentations from cutting-edge, top innovators who will present their innovations to a panel of industry judges - Innovation Zone - an exhibition area in showcasing the latest applications, services and technological advancements from the world’s foremost innovators

MWC 2009 : Thinkforward from Mobile World Congress, Barcelona


GSM Mobile World Congress 2009 has started since yesterday (16 February) in Barcelona. With all tha Mobile manufacturers deeply concern about the global economic ilness, they should take any advance proactive action towards excellent mobile solution. And the theme ” thinkforward” really suite to their this years target to achieve.

With 1300 exhibitors from whole around the world, the MWC2009 still shows their strength though facing the most challenging economical impact. They all coming away to Barcelona in order to share each other experience on the future mobile to the user.

Steve Ballmer (Microsoft), Chris DeWolfe (MySapce) are among the keynote speaker at the event. Over three days, The event will focus on creating business opportunities for innovators and promoting the innovation developments and opportunities through a number of exclusive initiatives:

A focused conference agenda featuring high-level speakers from across the operator, investment, vendor and mobile innovation communities Mobile Innovation EMEA tournament and Global Competition - “Pitch” presentations from cutting-edge, top innovators who will present their innovations to a panel of industry judges - Innovation Zone - an exhibition area in showcasing the latest applications, services and technological advancements from the world’s foremost innovators

Thursday, 12 February 2009

VoIP Next-Generation Network Overview

As far as I’m concerned, many modern telco engineers agree that VoIP can be deployed in many different network segments. To date, it has been progressively deployed in the backbone and enterprise networks. Deploying VoIP as an end-to-end Next-Generation Network solution introduces additional constraints and issues discussed by many VoIP researcher.

 

voip-arch
example of VoIP Next Generation Network architecture

 

Whatever the justifications brainstormed by many researcher, it come to conclusion that most service providers recognize the VoIP is the direction of the future. However when looking at a future PSTN scale solution service providers must ensure that the following key requirements are met to provide equivalence with the PSTN:

· Security
· Quality of Service
· Reliability
· Migration path
· OSS support
· Billing
· Network Interconnection

These issues are by no means simple and in many cases have delayed roll out of VoIP services. Future research in this field will look into more detail issues to consider at a high level how this next-generation network might be addressed. Perhaps, it can tackled as many issues as concerned by the researchers.