Connect with us

Featured

Prepare for Wi-Fi 6

From traffic to healthcare, the applications of the new Wi-Fi 6 standard are set to transform how we connect.

Published

on

20 years ago, with the release of 802.11b, Wi-Fi began its conquest of the world networking scene in earnest. Wi-Fi can easily be called out as one of the most popular technologies of the last two decades. Just as mobile telephony and mobile internet, it has become a part of everyday life. And with the advent of IoT and the introduction of 5G, the time has come for the new standard – Wi-Fi 6.

Beyond being significantly faster than the previous generation, Wi-Fi 6 delivers up to four times greater capacity. Latency is vastly improved, allowing for near real-time use cases. Wi-Fi 6 is also easier on connected devices’ batteries.

So what impact will Wi-Fi 6 have on business in the coming years?

Digitisation, mobility and IoT are driving the need for connectivity. By 2022, more IP traffic will cross global networks than in all prior ‘internet years’ combined up to the end of 2016. In other words, more traffic will be created in 2022 than in the 32 years since the internet started. In 3 years, 28 billion devices will be connected to the Internet, many of which (robots, production lines, medical devices) will communicate over a wireless network. Against this background, it is easy to understand why we need a redesigned wireless standard that is more responsive to present and future challenges.

Wi-Fi 6: The business impact

“In the first phase, we expect the new wireless standard to gain a significant foothold in the B2B field, where it brings important innovations,” said Garsen Naidu, Country Manager, Cisco South Africa. “We will see it, together with other technologies, penetrate significantly into manufacturing, into the logistics industry. The technology is also more effective in high-density settings like large lecture halls, stadiums and conference rooms, so we are likely to see significant penetration in these settings too. And, with its extremely low latency, Wi-Fi 6 also promises to open up new opportunities in AR/VR, healthcare, and self-driving vehicles. ”

Ever since the launch of the Internet, every leap in network speed has had a major impact on technological innovation: 4G has brought along the age of smartphones, whilst 5G and Wi-Fi 6 will transform the business world. According to Cisco experts, these two technologies – 5G and Wi-Fi – will be widely adopted at the same time, complementing each other.

A short history of Wi-Fi

In 1999, half a dozen technology companies, including Aironet, which was later acquired by Cisco, formed the Wireless Ethernet Compatibility Alliance. The standard announced that year, 802.11b, which gained significant commercial traction, was the first to emerge under the ‘Wi-Fi’ brand. As such, 1999 marks the year in which Wi-Fi really began.

Solutions that carry the official Wi-Fi logo work consistently with the IEEE 802.11 data transfer standard. These solutions are certified by the Wi-Fi Alliance, which guarantees compatibility between various wireless devices. In addition, networking manufacturers have done a lot to improve compatibility. Launched as early as 2002, Cisco Compatible eXtensions is a free licensing program that has enabled other vendors’ Wi-Fi products to be securely deployed on Cisco wireless networks.

Subsequent developments in Wi-Fi technology included managing interference and increasing data stability. Cisco is supporting these with the Cisco Flexible Radio Assignment and Cisco CleanAir technologies. The latter is capable of identifying and graphically displaying radio interference, identifying the source of the problem, and directing users to other, less crowded, channels.

Challenges of the present and opportunities for the future

One of the most widespread business applications of wireless technology is office Wi-Fi. Using Wi-Fi, employees can move freely and access the network from anywhere where there is a hotspot. Wi-Fi-based analysis and location services are also becoming increasingly popular. And with the spread of IoT, Wi-Fi is becoming ubiquitous, and is today found everywhere from agricultural fields to production lines.

“We see promising business opportunities and a wide range of new applications. At the same time, with hundreds and thousands of new devices connecting to wireless networks, IT teams are facing increasing complexity. So we need to rethink IT architectures from the ground-up,” added Naidu.

Much of this need to rethink network architectures is driven by the enormous growth in wireless connectivity.

Wi-Fi has driven growth in general IT use, which in turn has led to the need to provide and run bigger and more complex networks with a greater variety of endpoint device types on them. This complexity ‘feedback loop’, driven in no small part by Wi-Fi, requires that new solutions are developed to deal with this complexity.

Cisco has pioneered in this area, using AI, machine learning, and machine reasoning, via products such as Cisco DNA Assurance to eliminate manual troubleshooting and reduce the time spent resolving service issues.

The latest Wi-Fi 6 developments introduced earlier this year make a consistent, efficient and seamless wireless connectivity experience a reality.

Competitions

New Bok coach to reveal technology game-changers

Fans have been invited to discover the future of SA rugby and technology at the Dell Tech Byte online event with new Springbok coach Jacques Nienaber. (Win a VIP invite)

Published

on

Image by Jason.nlw

New Springbok rugby coach Jacques Nienaber is set to lift the lid on his vision for South African rugby over the next few years – and how technology has helped the boks take their game to new heights.

Nienaber will join technology expert Nigel Moulton at a Dell Tech Byte online event on 12 March 2020, where he will talk through how technology improved the boks’ game, and what is next for the world champions.

When the Springboks emerged victorious at the Rugby World Cup in 2019, it was the culmination of years of effort and focus. The team also employed modern sports technologies, such as player performance analytics, to hone a winning team into its best shape. 

Nienaber will offer insights into these technologies, and how they align with his vision. He will discuss both the national team, which is sponsored by Dell Technologies, as well as his ambitions for women’s rugby in South Africa.

Jacques Nienaber, new Springbok rugby coach

Attendees interested in the broader impact of technology will hear from Nigel Moulton, Dell Technologies’ global chief technology officer (CTO). He frequently delivers keynote presentations on the impact of digital technology on human futures. 

“We designed the Dell Technologies Tech Byte online event to reach a wide audience,” says Jason Jenkinson, country marketing manager at Dell Technologies SA. “Instead of limiting this to a physical showcase, we are creating a unique opportunity to meet the new Springbok rugby coach and learn more about where technology is headed on and off the field. 

“Our global CTO will delve into the current state of digital transformation, the connected CEOs who are more in touch with their transformation efforts, and the growing relationship between the CIO and CEO.”

Jason Jenkinson, country marketing manager at Dell Technologies SA

The online live event will be hosted by Dell Technologies South Africa MD Doug Woolley, and MCd by the well-known personality Aki Anastasiou.

“It’s been an amazing journey with the Springbok team so far, and we wanted to share some of that with the rest of the country,” says Jenkinson. “Where is SA rugby going and how is technology helping create more winners? Jacques Nienaber will share his vision for the team and the sport, and connect a few technology dots as well. 

“Nigel Moulton will take us deeper into the practical side of the technology revolution, which will interest business leaders and decision-makers. This event is a great opportunity to see just how much technology influences everyone’s success.”

* Win an exclusive brunch, served as a snack box wherever you are, as part of the TechByte online event, designed by Dell Technologies to keep you at the forefront of digital transformation.  Dell Technologies has given us the opportunity to invite 3 Gadget readers to be VIP virtual guests during the webinar. Retweet with comment/Quote Tweet a simple question we have posted on Twitter, with your answer in the comment, and tag @DellTechZA. The winners will receive a snack box filled with food, snacks and a drink to enjoy while watching the webinar. 

Continue Reading

Featured

Ultrasonic waves used to hack Siri and Google

Published

on

Photo by Maurizio Pesce from Milan, Italia

Ultrasonic waves don’t make a sound, but they can still activate Siri on your cellphone and have it make calls, take images or read the contents of a text to a stranger. All without the phone owner’s knowledge.

Attacks on cell phones aren’t new, and researchers have previously shown that ultrasonic waves can be used to deliver a single command through the air.

However, new research from Washington University in St. Louis expands the scope of vulnerability that ultrasonic waves pose to cellphone security. These waves, the researchers found, can propagate through many solid surfaces to activate voice recognition systems and — with the addition of some cheap hardware — the person initiating the attack can also hear the phone’s response.

The results were presented Feb. 24 at the Network and Distributed System Security Symposium in San Diego.

“We want to raise awareness of such a threat,” says Ning Zhang, assistant professor of computer science and engineering at the McKelvey School of Engineering. “I want everybody in the public to know this.”

Ning Zhang, assistant professor of computer science and engineering at the McKelvey School of Engineering

Zhang and his co-authors were able to send “voice” commands to cellphones as they sat inconspicuously on a table, next to the owner. With the addition of a stealthily placed microphone, the researchers were able to communicate back and forth with the phone, ultimately controlling it from afar.

Ultrasonic waves are sound waves in a frequency that is higher than humans can hear. Cellphone microphones, however, can and do record these higher frequencies.

“If you know how to play with the signals, you can get the phone such that when it interprets the incoming sound waves, it will think that you are saying a command,” Zhang says.

To test the ability of ultrasonic waves to transmit these “commands” through solid surfaces, the research team set up a host of experiments that included a phone on a table.

Attached to the bottom of the table was a microphone and a piezoelectric transducer (PZT), which is used to convert electricity into ultrasonic waves. On the other side of the table from the phone, ostensibly hidden from the phone’s user, is a waveform generator to generate the correct signals.

The team ran two tests, one to retrieve an SMS (text) passcode and another to make a fraudulent call. The first test relied on the common virtual assistant command “read my messages” and on the use of two-factor authentication, in which a passcode is sent to a user’s phone — from a bank, for instance — to verify the user’s identity.

The attacker first told the virtual assistant to turn the volume down to Level 3. At this volume, the victim did not notice their phone’s responses in an office setting with a moderate noise level.

Then, when a simulated message from a bank arrived, the attack device sent the “read my messages” command to the phone. The response was audible to the microphone under the table, but not to the victim.

In the second test, the attack device sent the message “call Sam with speakerphone,” initiating a call. Using the microphone under the table, the attacker was able to carry on a conversation with “Sam.”

The team tested 17 different phone models, including popular iPhones, Galaxy and Moto models. All but two were vulnerable to ultrasonic wave attacks.

Ultrasonic waves made it through metal, glass and wood

They also tested different table surfaces and phone configurations.

“We did it on metal. We did it on glass. We did it on wood,” Zhang says. They tried placing the phone in different positions, changing the orientation of the microphone. They placed objects on the table in an attempt to dampen the strength of the waves.

“It still worked,” he says. Even at distances as far as 30 feet.

Ultrasonic wave attacks also worked on plastic tables, but not as reliably.

Phone cases only slightly affected the attack success rates. Placing water on the table, potentially to absorb the waves, had no effect. Moreover, an attack wave could simultaneously affect more than one phone.

The research team also included researchers from Michigan State University, the University of Nebraska-Lincoln and the Chinese Academy of Sciences.

Zhang says the success of the “surfing attack,” as it’s called in the paper, highlights the less-often discussed link between the cyber and the physical. Often, media outlets report on ways in which our devices are affecting the world we live in: Are our cellphones ruining our eyesight? Do headphones or earbuds damage our ears? Who is to blame if a self-driving car causes an accident?

“I feel like not enough attention is being given to the physics of our computing systems,” he says. “This is going to be one of the keys in understanding attacks that propagate between these two worlds.”

The team suggested some defense mechanisms that could protect against such an attack. One idea would be the development of phone software that analyzes the received signal to discriminate between ultrasonic waves and genuine human voices, Zhang says. Changing the layout of mobile phones, such as the placement of the microphone, to dampen or suppress ultrasound waves could also stop a surfing attack.

But Zhang says there’s a simple way to keep a phone out of harm’s way of ultrasonic waves: the interlayer-based defense, which uses a soft, woven fabric to increase the “impedance mismatch.”

In other words, put the phone on a tablecloth.

Continue Reading

Trending

Copyright © 2020 World Wide Worx