Dangerous by Default – Embedded Devices and Their Invaders

By JDavis | 3/8/11 7:23 AM

Embedded devices are an integral part of everyday life, from where we work to where we live and play. It is well known that more traditional offline machines like printers, air conditioners, and security cameras are being connected to the Internet. On the business front, relying on IP-enabled devices helps to drive down costs in repairs while putting efficiency on the rise.

Read More >

Only a Matter of Weeks Before the World Runs Out of IP Addresses

By JDavis | 1/27/11 8:20 AM

The proclaimed “Father of the Internet,” Google VP Vint Cerf, warns that there won’t be enough IP addresses left to accommodate people and businesses connected via the Internet. What does this mean? The Internet is dependent on an internet protocol called IPv4, and when Cerf first began the experiment, he had no idea that the Internet would reach its capacity. IPv4 enables one computer to communicate with another, and until the next version of the protocol is put in place, the way that we unite over the Web will be seriously compromised.

The Sydney Morning Herald reports that,

Read More >

Smart Car with Not-So-Smart Feature

By JDavis | 1/20/11 5:48 AM

GM is planning on giving each new Chevy Volt sold its own IP address. This is creating concern among experts that hackers will be able to take control of cars. Security measures are in place to prevent this from occurring, but it is unlikely to dissuade the most serious hackers, who may be willing to hack deeply enough to do damage.

Read More >

Vocality Picks Mocana to Protect New Portable Satellite Communications Gear for Soldiers

By JDavis | 9/7/10 2:48 PM

Vocality, a company that builds ultra-portable network routers and secure voice over IP devices for tactical and defense applications, announced that it has standardized on Mocana's Device Security Framework™ technology to provide security services for its miniature BASICS IP router designed for military backpacks, also known as "manpacks" and first responder communications platforms. The Vocality BASICS IP product offers a fully PC104-compliant network router in an ultraportable form factor, perfect for integration into soldiers' tactical kits, manpacks and field communications kits.

The BASICS IP router package, incorporating Mocana's IP security capability, is available and shipping today to Vocality's end users and systems integrator partners.

Read More >

REDCOM Picks Mocana to Secure Carrier Class 4/5 IP Softswitch Solutions

By Mocana | 12/8/09 8:06 AM

Victor, N.Y. and San Francisco (November 24, 2009)‚ REDCOM Laboratories Inc., a company that designs and manufactures digital and IP-enabled telecommunications systems, today announced a technology partnership with Mocana to secure REDCOM'S TRANSip® IP technology suite. REDCOM announced an agreement to integrate Mocana's NanoSSL™ Advanced™ device integrity software to implement secure SIP over TLS and to encrypt remote administration of REDCOM HDX and SLICE® 2100™ softswitches. Mocana's security technology embedded within these REDCOM platforms protects users from eavesdropping, data theft and VoIP man-in-the-middle attacks by encrypting content and authenticating endpoints at carrier-class traffic volumes and speeds.

TRANSip is a Mocana-secured, fully integrated VoIP and TDM solution available for the REDCOM HDX and SLICE 2100 Carrier Class 4/5 softswitch platforms that incorporates the benefits of TDM and IP technologies. TRANSip provides a SIP Call Controller, Media Gateway, Media Gateway Controller, and a full range of related IP telephony capabilities and features. TRANSip also supports traditional TDM transport and signaling interfaces and features.

Read More >

MOCANA CASE STUDY: Securing Radvisions Multiconferencing Unit

By JDavis | 10/26/09 7:26 AM

As videoconferencing becomes more widespread, even the most sensitive meetings are migrating online. Mocana customer Radvision knew it needed to do something to protect their government and commercial customers' most sensitive videoconferences from hackers, interception and eavesdropping.

Read More >