Israel to Deploy Rocket Defense Shield

With all eyes on Libya and the Muslim revolutions occurring in several nations, many media outlets have missed the story about increased attacks against Israel.

According to Foxnews, Israel has recently faced the most brutal rocket and mortar attack since Israel’s military campaign into Gaza to stop rocket attacks in 2009.

But to Israel’s credit, they are not just sitting by idly as the attack ensues. On Sunday, Israel has implemented a rocket defense shield called Iron Dome. According to Foxnews:

Iron Dome uses sophisticated cameras and radar to track incoming rockets, determine where they will land, and intercept and destroy them far from their targets. If the system determines the rocket is headed to an open area where casualties are unlikely, it can allow the weapon to explode on the ground.

The deployment time was moved up due to the increased attacks against Israel.

But they have not just created a rocket defense shield, Israel has also created a vehicle defense “shield” to protect their combat vehicles from anti-tank weapons. On March 1st, Israel’s Trophy Tank Protection System successfully destroyed a live rocket propelled grenade (RPG) attack:

An RPG-7 was shot directly at an Israeli tank. The Trophy system was automatically enabled and prevented the RPG from hitting the tank. At first the soldiers in the tank didn’t even notice that an RPG was heading directly towards them. They saw the system alerting and a few minutes later understood that the Trophy had worked successfully. It had prevented the RPG from hitting their tank.

Being surrounded on every side, Israel is creating hi-tech weapons to ensure its survival.

Wireless Security – Choosing the best Wi-Fi Password

Running through some tests for an upcoming wireless security book and it really brings home the importance of choosing a good password for your Wi-Fi network.

Currently, the best security setting for your home or office Wi-Fi is WPA2. WPA2 Enterprise is the best if your organization supports it, but WPA2 Personal is great for home and small offices. Do not use WEP. It has been cracked a long time ago, and an attacker does not even have to crack it, the WEP key can be passed just like NTLM passwords.

The most common technique used for WPA/WPA2 hacking is a dictionary attack. The attacker captures a WPA password handshake and passes this through a program that will try numerous passwords from a word list. Here is the key, if the password is not in the word list, they hacker does not get into your system.

Using a lengthy complex password goes a long way in keeping your WPA2 network secure. A combination of upper/lower case letters, numbers and special characters is the best bet. Some prefer using a short sentence that means something to them, while replacing some of the letters with numbers and adding in a few extra characters.

For example: M0untainD3wI$G00d4u!

The nice thing about passwords like this is that it actually means something to you, so it will be much easier to remember.

I just ran one common word list attack against my WPA2 password. It tried over 1 million word combinations from the list with no dice. My network is still secure!

The more un-dictionary looking your password is, the better!

Small Business Network Drive Storage – Western Digital My Book Live

Need 2 TB of storage for your Small Business network that is fully accessible over your LAN? Just plug in Western Digital’s NAS solution for home or small business, the My Book Live Home Network Drive.

The drive comes with a 10/100 Ethernet connection and a power supply. Just plug in the power supply, connect a network cable and you now have a 2 TB storage server. If you just want to share photos and videos, that is really all you need to do. The drive comes pre-configured with public photo, music and video folders.

Need to create users and file share permissions on the drive? No problem, just install the CD that comes with the drive, run the setup, and configure the device via web interface. You can create multiple users and setup whatever share permissions on the directories that you want.

The drive is a true storage server, it shows up in your network neighborhood and you can map drives to it just like you would any server. It also has a media server installed on it, so you can play music directly from it with your  Microsoft, or Linux clients and also your PS3 or Xbox. You can also view photos from it through your iPhone or iPad.

I absolutely love this drive. It is fairly quick, copying data through the 100 Mb connection at 9-11 Megabytes a second. That is pretty much full line speed for a 100 Mb connection. It has a ton of storage space, and is a breeze to set up. It can also be setup to e-mail you administrative alerts.

I almost forgot to mention it also comes complete with an automated backup system to protect your critical workstation files.

I was able to copy my media files and even perform full backups for a couple systems to it that I needed to wipe. The drive performed absolutely flawlessly.

So what is not to like? Well, one drawback is that it is not meant to be a portable drive. It is meant to be setup in a stationary location. Also, there is no option for expansion or USB port. For these options check out the My Book Live World Edition drives. Finally, I was not able to connect my Wii console to it as a media client. But, after looking into it, the Wii does not come with that feature, but the PS3 and XBox both should work fine.

I really like this drive and highly recommend it.

Upcoming free Security Webinars – March 23, 2011

A couple interesting webinars are coming up ( All information from presenters website):

For today, a must see is:
Pen Testing Perfect Storm Part VI “We Love Cisco!

Guest Speakers: Ed Skoudis, Joshua Wright, and Kevin Johnson
Date: Wednesday, March 23, 2011
Time: 2PM EDT / 11AM PDT (GMT -4:00, New York)

About this webcast:
During this webcast, security swashbucklers Ed Skoudis, Joshua Wright and Kevin Johnson will return with more penetration testing madness and demonstrate techniques that you can use to proactively assess the security of Cisco networking equipment throughout your organization. 

You’ll learn how to…

  • Use XSS vulns and Project Yokoso to discover Cisco-centric management interfaces
  • Abuse web interfaces for infrastructure control
  • Leverage SNMP-to-telnet access escalation for switch pwnage
  • Conduct privlege escalation with switch mirror ports
  • Engaged in VLAN hopping for fun and profit
  • Set up your own virtual routing lab for practice and testing

Avoiding Data Breach Catastrophe – Beyond 2 Factor Authentication

Join the FS-ISAC and Voltage for a complimentary webcast:
WHEN: Wednesday, March 30, 2011
TIME: 11:00 am EDT / 8:00 am PDT

Recent data breaches at public and private corporations have shown that reliance on perimeter level security is not sufficient – once hackers find a way in they are able to collect data unimpeded. A breach at a notable security company has resulted in potential risks to customers using two-factor authentication however data protection that relies on secrecy or obscurity may not be a good approach.  This session will examine potential risks and suggest strategies for pro-actively protecting data in all its forms inside the enterprise.

And finally Upcoming SANS webinars:

March 23, 2011:
Analyst Webcast: Managing Insiders (Contractors, Vendors, and Employees) in SCADA Environments
Sponsored By: ArcSight, an HP Company, Industrial Defender , waterfall security
March 24, 2011:
Web 2.0 Security: Same old but different
Sponsored By: SonicWall
April 07, 2011:
Improve firewall security odds: Prevent misconfigurations and compliance concerns by automating firewall audits
Sponsored By: Skybox Security, Inc.
April 13, 2011:
Internet Storm Center Threat UpdateISC Webcast
Sponsored By: Core Security Technologies
April 14, 2011:
Analyst Webcast: Addressing the Top 20 Critical Security Controls with SIEM
Sponsored By: ArcSight, an HP Company