1,500 severe security events detected on Black Hat WLAN
Posted on 30 July 2012.
The WLAN network at Black Hat was accessed by 3,155 attendees with a maximum of 904 simultaneous clients, detected and quickly contained a total of 1,561 severe independent security events.

These events included more than 280 rouge APs – with some rogue APs attempting to impersonate the official event network.

Other wireless attacks that were detected included Block ACK DoS attacks, Power Save DoS attacks, Deauth Broadcast, AP Spoofing and “Hotspotter” attacks. The network also detected some malicious fragmentation-based attacks from the wired side, which were all contained very quickly.

Apple devices were most prevalent at this year’s event, with iOS devices at 29.6 percent of the total and 13.7 percent for Mac OS. Linux users came in at 19.9 percent of the total, Windows were 19.2 percent and Android 17.6 percent.

The network, which covered a 200,000 square foot facility, consisted of 23 mesh point Aruba AP-134 APs and 16 mesh portal Aruba AP-134 APs. The 16 mesh portal APs were wired into the hotel’s infrastructure. Also included in the network were an Aruba 3600 Mobility Controller and an Aruba S3500 Mobility Access Switch.

Aruba engineer Robbie Gill said: "You simply don’t see the kind of traffic, users or volume of security incidents that you see at Black Hat USA anywhere else."


Infographic: 25 years of the firewall

Posted on 24 July 2014.  |  The firewall turned 25, and McAfee is celebrating with an infographic that creatively depicts its lifetime. If you take a moment to scan the infographic, you’ll notice the firewall's introduction and evolution coincide with certain security events.

Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.

Daily digest

Receive a daily digest of the latest security news.


Fri, Jul 25th