article thumbnail

Keezel's wireless device protects hotel Wi-Fi , home IoT connections

Network World

In cryptography, the "man in the middle" is usually an attacker -- but when Keezel wants to get between you and the Wi-Fi connection in your hotel or your home, it's for your own good. If there is authentication, it's often only for billing purposes, and performed by a captive portal after the traffic has gone over the air in the clear.

Hotels 150
article thumbnail

It's 2017 and changing other people's flight bookings is incredibly easy

Network World

The travel booking systems used by millions of people every day are woefully insecure and lack modern authentication methods. This allows attackers to easily modify other people's reservations, cancel their flights and even use the refunds to book tickets for themselves, according a team of researchers who analyzed this online ecosystem.

Hotels 170
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Ransomware Exponentially Increasing as IoT Provides Physical Targeting Opportunities

CTOvision

Ransomware in late 2016 interrupted San Francisco Municipal Transportation Authority (SFMTA) payment machines and in Jan 2017 compromised the electronic key system of an Austrian hotel.

article thumbnail

How to Pick the Right Technology to Enable the Remote Workforce

CIO Business Intelligence

Users authenticate to a cloud access service broker (CASB), which is aware of all SaaS services in use across the organization — both authorized and unauthorized. But what about the executive traveling in Singapore who needs access to an internal SharePoint server from an unsecured computer in a hotel lobby?

How To 245
article thumbnail

A Vision of Radical Networking Simplicity

CIO Business Intelligence

Count them: the home Wi-Fi, the ISP, the Internet, a Domain Name System (DNS) provider, a content delivery network (CDN), applications distributed among multiple providers in multiple clouds, credit authentication companies, a private customer information database.

Network 243
article thumbnail

The Problem With Facial Recognition Systems

The Accidental Successful CIO

The Challenges Of Facial Recognition Systems Facial-recognition systems have been long touted as a quick and dependable way to identify everyone from employees to hotel guests. s facial-recognition system to authenticate them. They are also using it to get through high-security entrances at hotels, business centers or hospitals.

System 246
article thumbnail

Marriott's Breach Saga Underscores Need for Cybersecurity Review

SecureWorld News

With more than 30 hotel brands, Marriott and its franchises manage more than 7,000 properties in the United States and more in 130 countries. The hotel giant acquired Starwood in 2016 for $13 billion, taking over its Westin, W Hotels, and St. Regis properties.

Hotels 121