Wireless Intrusion Detection Systems (WIDS) — Bastille

In a traditional, hard-wired network, the only way in is through the Internet-facing router. Most modern networks, though, include 802.11 wireless access points (APs). If they aren't well-secured, or if there are unauthorized APs on the network, they can open the systems to intruders.With wireless access, there's no firm boundary between the inside and outside. Other tenants in an office building could be in range. A spy could set up an inconspicuous wireless relay outside a building. Anyone who gets…

Leading RF Security Vulnerabilities in 2018 — Bastille

When you think of RF vulnerabilities, you probably think first of Bluetooth and Wi-Fi issues. There have been well-publicized vulnerabilities in both during the past year, but the issue is broader. RF devices also include RFID tags, NFC (e.g., Apple Pay), 433 MHz remote control, LR-WPAN networking, and a host of proprietary protocols. Any of them can have security issues.While the less known ones don't get as much publicity, they can cause considerable havoc. Proprietary protocols often don't get examined…

Hacked Pacemakers and Insulin Pumps Are Just the Beginning — Bastille

 As the number of medical devices explode, protection against RF risk in the clinical setting gets more complicated.In 2016, the healthcare industry received a wake-up call. Federal regulators discovered critical cybersecurity vulnerabilities in certain pacemakers, defibrillators and other medical devices made by St. Jude Medical. Because these devices use RF signals to transmit and receive patient data, these devices were vulnerable to intrusions and exploits that could have dire consequences for patients.    It wasn’t the first time medical device security…

Do You Know Who’s Hacking the Trading Floor? — Bastille

What You Need to Know About Monitoring Cellular and IoT Devices in Capital Markets Will the regulatory climate for capital markets cool off given the pro-business agenda of the current administration? It may be too early to tell, but many believe the answer will be “no” – especially as the government zeroes in on cybersecurity.Another area of particular focus is electronic communications (or e-comms), which touches virtually every aspect of buy and sell-side activities.Just ask FINRA. Last December, the agency…

Dallas Siren Attack — Bastille

In light of recent events, particularly the Dallas siren hack we'd like to go through a couple of plausible scenarios that might explain this attack and how they relate to the need for more security when designing RF-enabled devices and implementing RF-enabled networks.For now, let’s look at the Dallas incident to examine how some public safety and large-scale RF networks work, how they might be vulnerable to such attacks, and what you should take into account when designing and securing such…