Cisco Blogs


Cisco Blog > SP360: Service Provider

Wi-Fi moves to real-time with VoWi-Fi

The recent release of the Cisco® Universal Wi-Fi solution for service providers is the industry’s first end-to-end solution with HD VoWi-Fi (Voice over Wi-Fi) as a key feature. This focus on Voice signals a significant turning point in the role of Wi-Fi in Mobile Network Operator Networks (MNOs).

Up until now, while Wi-Fi access has widespread acceptance by MNOs globally, its focus has been for low $ yield best-effort traffic. Wi-Fi’s significantly lower cost per bit TCO has made it attractive for taking on the bulk of the insatiable mobile device data demand in recent years. However now we see a shift in this approach, from looking at Wi-Fi as a secondary “best-effort” access only to also being a supplementary access for real-time services i.e. Voice.

VoWiFi

The culmination of several enhancements in the Wi-Fi end-to-end solution Read More »

Tags: , , , , , , , , ,

RATs in Your Data Center

News agencies like ABC News, CNN, and others have run stories on the FBI sting operation against more than 100 hackers who were involved in using and/or distributing the Blackshades RAT (articles in the hyperlinks for reference). For a mere US$40, a novice computer user can become a hacker and gain access to anyone’s computer, including gaining control over their video camera. If this novice hacker in the making needs help operating the RAT, many video instructions can be found on YouTube. This would be a form of free technical support. With over an estimated 500,000 computers infected, that leaves behind a serious footprint of compromised devices. As Marty Roesch, Cisco VP, Security Architect would say, “If you knew you were going to be compromised, would you do security differently?”

With over a half a million computers compromised from a single remote access toolkit, it is reasonable to think that a high percentage of those compromised computers would unknowingly be brought back to work and connected to the corporate network. Although inexpensive, the Blackshades RAT has an extensive set of capabilities such as keystroke logger, web cam control, full file access, etc. More than enough for the cyber attacker to assume the full identity of the owner of the compromised computer to allow them easy access to the business critical servers inside the data center as depicted in the diagram.

Read More »

Tags: , , , , , ,