{"id":3989,"date":"2016-11-17T12:12:03","date_gmt":"2016-11-17T17:12:03","guid":{"rendered":"http:\/\/community.mis.temple.edu\/itacs5211fall16\/?p=3989"},"modified":"2016-11-17T12:12:03","modified_gmt":"2016-11-17T17:12:03","slug":"the-wi-fi-router-that-sniffs-out-cyber-attacks","status":"publish","type":"post","link":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/2016\/11\/17\/the-wi-fi-router-that-sniffs-out-cyber-attacks\/","title":{"rendered":"The Wi-Fi Router That Sniffs Out Cyber Attacks"},"content":{"rendered":"<p>The Internet of Things is changing how we look at securing our home networks, gone are the days of just installing antivirus software on your pc and feeling secure. We now have to look at all the devices connected to our home network as a possible entry point for a cyber attack. Gryphon\u2019s wireless router aims to fill this void by offering a technology that monitors smart thermostats, webcams, and other internet-connected devices for unusual activity. Similar to how businesses have hardware\/software to monitor their networks for traffic. A perfect example of why this type of device is now needed is the DDOS attack a few weeks back that crippled internet activity for the northeast region of the united states before moving west. The DDOS attack took advantage of wireless devices on home networks to launch an attack on popular websites. I see this as a positive step in the IoT age.<\/p>\n<p><a href=\"http:\/\/www.bloomberg.com\/news\/articles\/2016-11-10\/the-wi-fi-router-that-sniffs-out-cyber-attacks\">http:\/\/www.bloomberg.com\/news\/articles\/2016-11-10\/the-wi-fi-router-that-sniffs-out-cyber-attacks<\/a><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Internet of Things is changing how we look at securing our home networks, gone are the days of just installing antivirus software on your pc and feeling secure. We now have to look at all the devices connected to our home network as a possible entry point for a cyber attack. Gryphon\u2019s wireless router [&hellip;]<\/p>\n","protected":false},"author":12710,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[717225],"tags":[],"class_list":{"0":"post-3989","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-week-12-it-security","7":"entry"},"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/posts\/3989","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/users\/12710"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/comments?post=3989"}],"version-history":[{"count":1,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/posts\/3989\/revisions"}],"predecessor-version":[{"id":3990,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/posts\/3989\/revisions\/3990"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/media?parent=3989"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/categories?post=3989"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/itacs5211fall16\/wp-json\/wp\/v2\/tags?post=3989"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}