New Gigacheck Wireless Analyzer Offers Smartphone App Connectivity to Test WiFi and Ethernet Connection Speeds

Press Release Summary:

Greenlee Textron Inc. announces GigaCheck in AirScout® line of wireless analyzers for testing Wi-Fi coverage and wired Ethernet connection. It measures signal to noise ratio, PHY rate and transmit/receive success rates on wireless networks using the industry standard Ookla® Speedtest®. The analyzer provides technicians with tools to validate connection speed on wireless and Ethernet networks and verify whether the customers receive the connection speeds they pay for and expect.

Original Press Release:

Greenlee Communications Launches AirScout GigaCheck

Easily Verify Network Connection Speeds with Greenlee® Communications AirScout® WiFi® Test System
AirScout® GigaCheck Tests WiFi and Ethernet Connection Speeds up to a full Gigabit
Vista, Calif., (June 19, 2018) — Greenlee Textron Inc., a Textron Inc. (NYSE: TXT) company, announces the addition of GigaCheck to its award-winning AirScout® line of wireless analyzers. Controlled via Smartphone app, GigaCheck tests Wi-Fi coverage as seen from the residential gateway and tests wired Ethernet connection upload and download speeds up to 1Gb in real-time.
“Today’s customer demands dependable, high-speed services and expects their service provider will deliver the speed they pay for. AirScout GigaCheck gives technicians the tools needed to quickly and easily validate connection speeds on both wireless and ethernet networks,” explains Oleg Fishel, Director of PLM for Greenlee Communications.
AirScout GigaCheck measures Signal to Noise Ratio, PHY Rate and transmit/receive success rates on wireless networks using the industry standard Ookla® Speedtest®. Upload/download and Ping tests are performed on both Ethernet and WiFi for real-time speed testing.
The AirScout unit connects to the wireless router in one-click and is controlled via a smartphone app. The simple connection and intuitive user interface of the app make it easy for technicians to verify customers are receiving the connection speeds they pay for and expect. Technicians define pass/fail thresholds based upon their SLA and can generate reports and save them in the Cloud for easy transference and transparency of test results.
BTR, Broadband Technology Report, awarded AirScout Enterprise the 2017 Diamond Technology Winner in Wi-Fi Solutions. For more information on the complete AirScout line, visit www.getairscout.com.
Greenlee, under its Greenlee Communications brand, develops Ethernet, Transport, C37.94, Fiber, DSL, Wi-Fi and Copper test solutions, tracing and locating equipment, and fiber/cable jet installation equipment. A broad product portfolio, coupled with solutions-branded Greenlee Utility®, HD Electric Company® and Sherman + Reilly®, creates a single source partner providing unmatched value to the communications and utility markets.
Greenlee Communications
The Greenlee Communications brand offers a complete line of innovative and industryleading test and measurement solutions for the communication service provider industry. Our expertise and innovative solutions address all stages of network deployment enabling the development, installation and maintenance of xDSL, fiber, cable and wireless networks. It is a leading brand of test and measurement solutions in the global communications industry with a long track record of delivering high quality innovative solutions enabling technicians to achieve their goals in a timely manner and with confidence.
Greenlee Textron Inc.
Greenlee Textron Inc. is known as a global leader in the professional tool category. The Rockford, Illinois-based company develops high quality innovative products distinguished by customer-driven design and differentiated by supply chain excellence. It also leverages its powerful brands such as Greenlee Communications and Greenlee Utility in the electrical, construction and maintenance markets worldwide. More information is available at www.greenlee.com.
About Textron Inc.
Textron Inc. is a multi-industry company that leverages its global network of aircraft, defense, industrial and finance businesses to provide customers with innovative solutions and services. Textron is known around the world for its powerful brands such as Bell, Cessna, Beechcraft, Hawker, Jacobsen, Kautex, Lycoming, E-Z-GO, Greenlee, Textron Off Road, Arctic Cat, Textron Systems, and TRU Simulation + Training. For more information, visit: www.textron.com.
Certain statements in this press release may describe strategies, goals, outlook or other non-historical matters; these forward-looking statements speak only as of the date on which they are made, and we undertake no obligation to update them. These statements are subject to known and unknown risks, uncertainties, and other factors that may cause our actual results to differ materially from those expressed or implied by such forward-looking statements.

The FBI wants you to factory reset your router. Here's how to do it

The VPNFilter malware problem is getting worse. Here's how to safeguard your home network, and a list of the affected models.

d-link-dir-867-6
The list of routers affected by VPNFilter has grown considerably.
Chris Monroe/CNET
Good news, everyone! Remember that FBI reboot-your-router warning in response to Russian malware VPNFilter? Turns out it's worse than originally thought, and a lot more people are going to need to do a lot more than just reboot their routers.
According to a new report from security firm Cisco Talos, the VPNFilter malware is "targeting more makes and models of devices than initially thought, and has additional capabilities, including the ability to deliver exploits to endpoints."
That means if you own one of the affected routers -- and that list has expanded to include models from Asus, D-LinkHuawei, Ubiquiti, Upvel and ZTE -- it's strongly recommended that you perform two key steps: upgrade the firmware and then factory-reset the router.
Ugh. This is going to suck. But we can get through it.

Step 1: Upgrade your router's firmware

In some ways this is the easier step, as it can often be done within the confines of your router's dashboard. Firmware is just the core software that operates the router, and updating it usually involves little more than a download and a few automated router restarts.
Of course, if you've never so much as looked at that dashboard, well, it may be time for a trip to the owner's manual -- or the router manufacturer's online help pages.
Because the firmware-update process varies from one make and model to another, here's a quick, generalized overview -- one that's based on upgrading an Asus WRT router.
Step i: Visit the Asus support site and download the most current firmware for your specific model.
Step ii: Open a browser window, type in 192.168.1.1 and press Enter. This will take you to the router's dashboard page -- but you may need a username and password to gain access. If you never changed the defaults, you should be able to find them in the instruction manual. (Often, the defaults are "admin" and "password," respectively.)
asus-firmware-upgrade-dialog
Updating your router's firmware may involve a screen like this.
Asus
Step iii: Click the Administration button (again, this is just for Asus routers; on other models it might be Configuration or Firmware or the like), then the Firmware Upgrade tab.
Step iv: Click Choose File and locate the firmware file you downloaded in Step 1. Then click Upload to perform the update.
This may take a few minutes, and your router will likely restart at least once during the process. Needless to say, you'll lose all internet connectivity while this is happening.
And, again, this is just one example of the firmware-update process. It's a common one, but the steps may be different for your model. 
Watch this: Russian hackers targeting your router: Here's what to...
1:23 

Step 2: Factory-reset your router

Now for the big hassle. You probably know that you can reboot or reset your router by pulling the power cord for a few seconds and then plugging it back in. But a factory reset is a little different. True to its name, it restores all the settings to their original, factory state, so once it's done, you get to have the fun of setting up your home network again.
Before you get started, make sure to write down the name and password of each Wi-Fi network currently configured on your router. You might have just one; I've seen houses that had five. You'll want to note these so you can recreate them verbatim after the factory reset.
Why is that important? Because if your current "SmithLAN" network becomes "Smith LAN" after the reset (just because you forgot and added a space this time), now you'll have to manually reconnect every device in your house to that "new" network. Hassle city.
The actual reset should be pretty easy. On some Linksys routers, for example, there's a small reset button on the unit itself. You press and hold it for 10 seconds and that's it. Alternately, you may be able to sign into the dashboard and execute the reset from there. In the aforementioned Asus example, in Step 3, you'd click the Restore/Save/Upload tab and then the Restore button.
Again, consult your router manual (or router's website) for the correct factory-reset steps for your model.
Here are links to the support directories for some of the affected routers (the complete list is in the next section): 
When it's done, you'll have to venture into the dashboard and recreate your networks. Thankfully, with your firmware upgraded and any trace of VPNFilter eradicated, you should be safeguarded from future attacks -- of this particular malware, anyway.

Which routers are affected?

Courtesy of Cisco Talos, here's a current list of the models that can be affected by VPNFilter. Those identified as new weren't included in the original report.
Asus
  • RT-AC66U (new)
  • RT-N10 (new)
  • RT-N10E (new)
  • RT-N10U (new)
  • RT-N56U (new)
  • RT-N66U (new)
D-Link
  • DES-1210-08P (new)
  • DIR-300 (new)
  • DIR-300A (new)
  • DSR-250N (new)
  • DSR-500N (new)
  • DSR-1000 (new)
  • DSR-1000N (new)
Huawei
  • HG8245 (new)
Linksys
  • E1200
  • E2500
  • E3000 (new)
  • E3200 (new)
  • E4200 (new)
  • RV082 (new)
  • WRVS4400N
Mikrotik
  • CCR1009 (new)
  • CCR1016
  • CCR1036
  • CCR1072
  • CRS109 (new)
  • CRS112 (new)
  • CRS125 (new)
  • RB411 (new)
  • RB450 (new)
  • RB750 (new)
  • RB911 (new)
  • RB921 (new)
  • RB941 (new)
  • RB951 (new)
  • RB952 (new)
  • RB960 (new)
  • RB962 (new)
  • RB1100 (new)
  • RB1200 (new)
  • RB2011 (new)
  • RB3011 (new)
  • RB Groove (new)
  • RB Omnitik (new)
  • STX5 (new)
Netgear
  • DG834 (new)
  • DGN1000 (new)
  • DGN2200
  • DGN3500 (new)
  • FVS318N (new)
  • MBRN3000 (new)
  • R6400
  • R7000
  • R8000
  • WNR1000
  • WNR2000
  • WNR2200 (new)
  • WNR4000 (new)
  • WNDR3700 (new)
  • WNDR4000 (new)
  • WNDR4300 (new)
  • WNDR4300-TN (new)
  • UTM50 (new)
Qnap
  • TS251
  • TS439 Pro
  • Other QNAP NAS devices running QTS software
TP-Link
  • R600VPN
  • TL-WR741ND (new)
  • TL-WR841N (new)
Ubiquiti
NSM2 (new)
  • PBE M5 (new)
  • Upvel
    • Unknown models (new)
    ZTE
    • ZXHN H108N (new)
via cnet

Is Your Router Vulnerable to VPNFilter Malware?

Below is a list of routers vulnerable to VPNFilter, malware that can brick your device.
The Justice Department last week urged everyone with a small office home office (SOHO) or NAS device to reboot their gadgets immediately in order to thwart VPNFilter, a new strain of malware that can brick your router.
SecurityWatchThe FBI seized a domain used to send commands to the infected devices, but it can't hurt to reboot anyway.
As Symantec outlines, VPNFilter is "a multi-staged piece of malware." Stage 1 makes the connection, Stage 2 delivers the goods, and Stage 3 acts as plugins for Stage 2. "These include a packet sniffer for spying on traffic that is routed through the device, including theft of website credentials and monitoring of Modbus SCADA protocols. Another Stage 3 module allows Stage 2 to communicate using Tor."
VPNFilter "is unlike most other IoT threats because it is capable of maintaining a persistent presence on an infected device, even after a reboot," Symantec says.
Still, "rebooting will remove Stage 2 and any Stage 3 elements present on the device, [temporarily removing] the destructive component of VPNFilter. However, if infected, the continuing presence of Stage 1 means that Stages 2 and 3 can be reinstalled by the attackers."
Those who believe they're infected should do a hard reset, which restores factory settings. Look for a small reset button on your device, though this will wipe any credentials you have stored on the device.
Below is a list of routers Symantec identified as vulnerable to VPNFilter. MikroTik tells Symantec that VPNFilter likely proliferated via a bug in MikroTik RouterOS software, which it patched in March 2017. "Upgrading RouterOS software deletes VPNFilter, any other third-party files and patches the vulnerability," Symantec says.
  • Linksys E1200
  • Linksys E2500
  • Linksys WRVS4400N
  • Mikrotik RouterOS for Cloud Core Routers: Versions 1016, 1036, and 1072
  • Netgear DGN2200
  • Netgear R6400
  • Netgear R7000
  • Netgear R8000
  • Netgear WNR1000
  • Netgear WNR2000
  • QNAP TS251
  • QNAP TS439 Pro
  • Other QNAP NAS devices running QTS software
  • TP-Link R600VPN
"No other vendors, including Cisco, have been observed as infected by VPNFilter, but our research continues," according to Cisco Talos, which first reported the bug.
To date, Cisco Talos estimates that at least 500,000 in at least 54 countries have been hit by VPNFilter.
The feds are pinning this attack on Fancy Bear, a hacking group also known as APT28 and Sofacy Group, among other monikers. The group is notorious for attacking governments across the world and stealing confidential files from the Democratic National Committee during the 2016 election.


via PCMag

IoT Security, Parental Controls, VPN & Dynamic DNS For Homes.



ENTERPRISE GRADE FIREWALL ROUTER FOR SAFER & SMARTER HOMES

Cybersecurity, Parental Controls & VPN Services For Your Home via Roqos Core routers.

https://www.roqos.com/

Roqos VPN provides you a secure Internet experience by encrypting all your connections and routing them to your home router. You can browse safely from public Wi-Fi, access your connected devices in your home remotely, and enjoy streaming services while away from home.

Keyllama 4MB USB Value Keylogger


Rating:  
Amazon Price: $55.50 $55.50 (as of February 7, 2018 10:34 – Details).
KeyLlama records everything typed on a USB keyboard. Absolutely no software is required and KeyLlama is completely invisible to any software. The KeyLlama USB is the stealthiest hardware keylogger in existence – it is impossible to detect!
Unlike many other keyloggers, these work with both low and full-speed USB Keyboards. Most newer USB keyboards operate at "full-speed." Most lower cost keyloggers do not work with full-speed keyboards. If they don't specifically state it will work, it almost certainly won't.

“Keyllama 4MB USB Value Keylogger”