IWL's KMAX network emulator is changing the way passwords are handled.
The state of California has enacted a new law that affects the way that initial passwords are established on network attached devices TITLE 1.81.26. Security of Connected Devices
It is a sensible law that will improve the security of devices on the internet.
As a consequence of these new requirements IWL is making a few changes to KMAX.
These changes are in effect for KMAX units constructed after mid November 2018. (Except for KMAX-V, the date for the change on that platform is yet to be established, but it is expected to occur before the end of 2018.)
Open source advocates have long proclaimed the intrinsic quality and security of open source code. They argue that because the code is open it is inspected by many eyes and tested by many hands.
I dispute that argument.
Code will become better through more inspection, and improved testing, no matter whether that code is "open", "free", or "proprietary".
IWL Engineering has completed its investigation of the CVE-2018-10933 security flaw (libssh bug) and found that this bug is not present in our products.
Based on testing conducted by IWL engineers, there is no indication that either Mini Maxwell or KMAX is subject to the libssh flaw.
For the Maxwell Pro products, based on RedHat Fedora, RedHat has stated that its systems are not vulnerable; our testing is consistent with that.
Implementations of the popular Message Queuing Telemetry Transport (MQTT) Publish and Subscribe Protocol are now subject to rigorous testing.
Question: My team is developing a new software app that runs on iOS and Android phones. I have Windows 10 running on my desktop. I plan to go ahead and test it out with the built-in Windows 10...
The Los Angeles Times reported today that "More than 23,000 Californians were registered to vote incorrectly by state DMV."
The errors, which were discovered more than a month ago, happened when DMV employees did not clear their computer screens between customer appointments. That ...
The cost of computer security breaches is no longer hypothetical. According to the Cisco 2018 Annual Cybersecurity Report (page 46), more than half (53 percent) of all attacks resulted in financial damages of more than US$500,000 (for each org...
Network bandwidth is the maximum data throughput in a specific segment of a digital communication system. For example, a wireless access point rated at 300 Mbps network bandwidth, will support data transiting through the access point at a rate no greater than 300 Mbps...
In 2013, Google announced a new transport protocol, the QUIC protocol (Quick UDP Internet Connections). QUIC’s original goal was to reduce transport latency, particularly with users of web apps (that use HTTP over TCP). The goal was later expanded to provide a reliable, connection-oriented, low...
Network emulators, network modelers and network simulators -- how do they differ? How do I know what solution would be right for my application? How do I compare an emulator vs a simulator?
Modelers, simulators, and emulators represent a continuum, that begins with pure mathematical software models and moves towards the physical reality of emulation.
A network modeler is a representation of a network based on a set of mathematical equations. With a network modeler, you mathematically define traffic volumes, flows, network architectures, etc. You can then visualize th...
How do you measure gravitational waves? How does that compare to counting bits in networking?
In June 2017, IWL Staff attended a fascinating lecture by Dr. Jess McIver of CalTech titled "Einstein Gravitational Waves and Black Holes". Dr. McIver described the operation of the LIGO project for...