Insurance companies, as members of the finance industry, are required to comply with the Payment Card Industry Data Security Standard (PCI-DSS) which requires quarterly WiFi audits to detect unauthorized WiFi (rogue access points), locate and remove them. Their Existing Method The Insurance company used their WiFi routers to detect unauthorized WiFi and alert the security […]
Technical Surveillance Counter-Measure (TSCM) companies specialize in locating and removing “bugs” to counter surveillance and espionage. Many of the “bugs”, including listening devices and hidden cameras, use wireless communication technologies such as WiFi. Their Existing Method An OSCOR Spectrum Analyzer is used to locate WiFi in the premises being swept. The Trial The TSCM company […]
Many organizations have a “no hotspot” policy for their staff, where creating a WiFi access point or “hotspot” with their phone is banned to stop staff circumventing corporate security. A Government department used the HackHunter Pursuit to find mobile hotspots in the office. Their Existing Method Visual audit. The Trial The HackHunter Pursuit was used […]
Prisons are increasingly concerned about contraband being thrown over the fence. Criminals hollow out tennis balls, footballs and even squash balls, and fill them with drugs, cigarettes, money, phones, sim cards, razor blades – whatever will fit – and throw them over the prison fence for inmates inside to recover. For example, in May 2020 […]
Organizations in the defence, government and law enforcement industries operate secure areas where all portable electronic devices are prohibited, including data centers. This manages the risk of eavesdropping or security compromise. These organizations need to locate WiFi which should not be in their environment (unauthorized WiFi) and investigate it to see if it should be […]
What’s the point of looking at data when the event’s already happened? And yet common WiFi security tools only analyze records after the event has passed.
Did you know that microwaves and routers look the same to an RF analyser because they “both operate on 2.4GHz WiFi”? This is just one of the reasons that WiFi protocol analysis beats RF analysis hands down.
During a floor walk with their internal WiFi specialists we put our Pursuit WiFi tracker to the test, and found that we were over 300% more effective than their existing solution for rogue access point and WiFi audits
In a series of field trials with an ASX-listed technology company and a retail franchise we enumerated WiFi networks and identified potential vulnerabilities while fine-tuning our Vision continuous monitoring sensors
Mike is an IoT expert with over 25 years’ experience in information and cyber security. He has worked as a CISO, a security consultant to over 50 organisations and provided investigatory and advisory services at the highest levels in government across topics as diverse as biometrics and satellite surveillance systems.