Showing posts from March, 2024

Connecting a Unifi AP into a Mikrotik router (VLAN)

Introduction This article describes the setup necessary for a Mikrotik router ( hAP ac 2 ) and a UniFi AP ( UAP-AC-LITE ) to operate correctly and allow clients to connect to the correct VLAN. Both the Mikrotik and the UniFi have their radios enabled, allowing clients to initiate a Wi-Fi connection with either device. Connected Wi-Fi clients can transit from one device to the other. Before the UniFi AP, a Cisco Aironet 1600e AP was plugged into ether2. The Cisco's firmware was  Autonomous AP IOS Software- 15.3.3-JF14i(ED) . This article doesn't go into setting up the Mikrotik. If you would like an explanation, ask, and I will try to create it. The following VLANS were defined: VLAN10      | Internal traffic                | HOMENET-AP SSID VLAN20      | Guest traffic                   | HOMENET-GUEST SSID The Mikrotik ports were setup as below: ether1              |      WAN (all traffic, tagged) ether2              |      Unifi AP (all traffic, tagged) ethe

Voice Cloning and the FTC competition to detect and prevent them

There have been many stories of how fake voice clones are being used to scam or mislead victims. Fake audio purporting to be of President Joe Biden, artists, TV personalities, and famous athletes has been reported in the news. They aim to convince people to perform an action, such as not vote or get a product or service.  Targeted phishing attacks against a person using fake voice clones of loved ones pretending to be in trouble are also used. The message asks the victim to transfer money to help out the relative who is in trouble. Imagine a phone call from your daughter, son, or partner asking you to transfer a few thousand dollars because they are in hospital, jail or have been kidnapped.  Even through this article focuses on audio fakes, the technology is evolving. In February, CNN reported that a finance worker a multinational firm was duped to pay out $25 million after video call with deepfake of the CFO. He attended a video call with other members of staff all of whom were ge

Great technology links - Great learning at zero cost - March 2024

In this edition of GTL, where we share resources to help you stay safe and secure online. We focus on two common threats that can compromise your online identity: credential stuffing and social engineering. Credential stuffing is a type of cyberattack where hackers use stolen or leaked usernames and passwords to access multiple online accounts while social engineering is a type of psychological manipulation where hackers trick you into giving up your credentials, personal information, or access to your devices. Make Gandalf Reveal the secret password Type: Social Engineering Game Your goal is to convince Gandalf to give you his password. As you progress through the seven levels, he becomes older and wiser and will not relinquish the password with the same ease and willingness as prior levels. Your interaction with the character is through text prompts. Your prompts will either lead the way towards your ultimate goal or result in a dead end. As you