{"id":2464,"date":"2018-10-05T13:32:59","date_gmt":"2018-10-05T13:32:59","guid":{"rendered":"http:\/\/www.mtin.net\/blog\/?p=2464"},"modified":"2018-10-05T13:32:59","modified_gmt":"2018-10-05T13:32:59","slug":"guest-article-can-my-router-catch-a-virus","status":"publish","type":"post","link":"http:\/\/www.mtin.net\/blog\/guest-article-can-my-router-catch-a-virus\/","title":{"rendered":"Guest Article: Can my router catch a virus?"},"content":{"rendered":"<p>Our friends over at TechWarn have their take on routers vulnerable to virus attacks<\/p>\n<p><a href=\"https:\/\/www.expressvpn.com\/blog\/can-my-router-catch-a-virus\/\">https:\/\/www.expressvpn.com\/blog\/can-my-router-catch-a-virus\/<\/a><\/p>\n<p><em>Big price differences between routers are often confusing to consumers as, unlike with personal computers, the quality difference is not always obvious. As routers are normally tied to a physical location, it is also\u00a0<strong>rather difficult to test their reliability<\/strong>\u00a0in different environments, unlike with highly mobile laptops or smartphones.<\/em><\/p>\n<p><em>Routers often do not receive updates, or updates have to be manually downloaded and applied \u2014 a cumbersome process that is not an attractive option to many non-tech-savvy users.<\/em><\/p>\n<p><em>Routers are desirable targets for attackers as they sit at a very sensitive spot on a network \u2014 right at the edge. They are a centralized point and connected to every single device in the network. Routers read all of the data that each device sends to\u00a0<a href=\"https:\/\/www.expressvpn.com\/blog\/what-is-the-internet\/\" target=\"_blank\" rel=\"noopener\" data-wpel-link=\"internal\">the Internet<\/a>, and if these connections are unencrypted, the router could easily inject malicious scripts and links.<\/em><\/p>\n<p>Read more here..<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Our friends over at TechWarn have their take on routers vulnerable to virus attacks https:\/\/www.expressvpn.com\/blog\/can-my-router-catch-a-virus\/ Big price differences between routers are often confusing to consumers as, unlike with personal computers, the quality difference is not always obvious. As routers are normally tied to a physical location, it is also\u00a0rather difficult to test their reliability\u00a0in different [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1799,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false,"jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false}}},"categories":[274],"tags":[629,334,628,358],"jetpack_publicize_connections":[],"aioseo_notices":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.mtin.net\/blog\/wp-content\/uploads\/2017\/09\/download.jpg?fit=236%2C213","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p6VLMf-DK","jetpack-related-posts":[{"id":3427,"url":"http:\/\/www.mtin.net\/blog\/router-vulnerability-roundup-for-april-2019\/","url_meta":{"origin":2464,"position":0},"title":"Router Vulnerability roundup for April 2019","author":"j2sw","date":"April 25, 2019","format":false,"excerpt":"https:\/\/www.zdnet.com\/article\/cisco-warns-over-critical-router-flaw\/ Cisco has disclosed 29 new vulnerabilities and is warning customers using its ASR 9000 Series Aggregation Services Routers to install an update to address a critical flaw that can be exploited remotely without user credentials. https:\/\/securityintelligence.com\/buffer-overflow-vulnerability-in-tp-link-routers-can-allow-remote-attackers-to-take-control\/ Buffer Overflow Vulnerability in TP-Link Routers Can Allow Remote Attackers to Take Control","rel":"","context":"In &quot;cisco&quot;","block_context":{"text":"cisco","link":"http:\/\/www.mtin.net\/blog\/category\/cisco\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.mtin.net\/blog\/wp-content\/uploads\/2019\/04\/encryption-head-640x353-2.jpg?fit=640%2C353&resize=350%2C200","width":350,"height":200},"classes":[]},{"id":2837,"url":"http:\/\/www.mtin.net\/blog\/baicells-public-ips-on-client-routers\/","url_meta":{"origin":2464,"position":1},"title":"Baicells: Public IPs on client routers","author":"j2sw","date":"February 7, 2019","format":false,"excerpt":"Public IPs on Baicells Client Routers. I needed to Provide a few customers with Public IPs while most of the UEs and clients got private IP. The following is what I did to allow this to work: Requirements: EnodeB in Bridge mode UE in NAT mode MikroTik Router with DHCP\u2026","rel":"","context":"In &quot;Wireless&quot;","block_context":{"text":"Wireless","link":"http:\/\/www.mtin.net\/blog\/category\/wireless\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.mtin.net\/blog\/wp-content\/uploads\/2017\/05\/17821343_1510820508928612_1776831623_n.jpg?fit=405%2C720&resize=350%2C200","width":350,"height":200},"classes":[]},{"id":2656,"url":"http:\/\/www.mtin.net\/blog\/some-basic-cisco-router-terminology\/","url_meta":{"origin":2464,"position":2},"title":"Some basic Cisco router terminology","author":"j2sw","date":"November 27, 2018","format":false,"excerpt":"For those of you not so familiar with routers https:\/\/ccnaeducation.com\/lan-and-wan-interfaces-in-router\/","rel":"","context":"In &quot;cisco&quot;","block_context":{"text":"cisco","link":"http:\/\/www.mtin.net\/blog\/category\/cisco\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":2421,"url":"http:\/\/www.mtin.net\/blog\/cambium-and-management-vlans\/","url_meta":{"origin":2464,"position":3},"title":"Cambium and Management vlans","author":"j2sw","date":"September 6, 2018","format":false,"excerpt":"Just a quick diagram on how to separate Management traffic on an ePMP network. The aps\u00a0and CPE are in bridge mode in this setup. The Cambium CPE are in bridge mode with CNPilot routers doing PPPoE, which the ISP has control over as a managed router. Our netonix has a\u2026","rel":"","context":"In &quot;Cambium&quot;","block_context":{"text":"Cambium","link":"http:\/\/www.mtin.net\/blog\/category\/cambium\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.mtin.net\/blog\/wp-content\/uploads\/2018\/09\/aps_vlans-e1536254028499.jpg?fit=647%2C532&resize=350%2C200","width":350,"height":200},"classes":[]},{"id":217,"url":"http:\/\/www.mtin.net\/blog\/modular-advantages\/","url_meta":{"origin":2464,"position":4},"title":"Modular advantages","author":"j2sw","date":"December 30, 2014","format":false,"excerpt":"Several of you have heard me talk about modular network design. There are five distinct advantages of a modular network design. 1.Scalable You can upgrade pieces easier than all-in-one devices. Being able to upgrade a certain module for that big new client might mean the difference between being able to\u2026","rel":"","context":"In &quot;Networking&quot;","block_context":{"text":"Networking","link":"http:\/\/www.mtin.net\/blog\/category\/networking\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":443,"url":"http:\/\/www.mtin.net\/blog\/how-does-bgp-select-which-route\/","url_meta":{"origin":2464,"position":5},"title":"How does BGP select which route?","author":"j2sw","date":"November 26, 2015","format":false,"excerpt":"BGP can be a complex and almost mystical protocol. For those of you who are trying to determine how BGP selects which route here is your guide. Before we get into it a couple of things to keep in mind. First, BGP is not a multipath routing protocol. This is\u2026","rel":"","context":"In &quot;BGP&quot;","block_context":{"text":"BGP","link":"http:\/\/www.mtin.net\/blog\/category\/networking\/bgp\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"jetpack_likes_enabled":true,"_links":{"self":[{"href":"http:\/\/www.mtin.net\/blog\/wp-json\/wp\/v2\/posts\/2464"}],"collection":[{"href":"http:\/\/www.mtin.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.mtin.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.mtin.net\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/www.mtin.net\/blog\/wp-json\/wp\/v2\/comments?post=2464"}],"version-history":[{"count":1,"href":"http:\/\/www.mtin.net\/blog\/wp-json\/wp\/v2\/posts\/2464\/revisions"}],"predecessor-version":[{"id":2465,"href":"http:\/\/www.mtin.net\/blog\/wp-json\/wp\/v2\/posts\/2464\/revisions\/2465"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/www.mtin.net\/blog\/wp-json\/wp\/v2\/media\/1799"}],"wp:attachment":[{"href":"http:\/\/www.mtin.net\/blog\/wp-json\/wp\/v2\/media?parent=2464"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.mtin.net\/blog\/wp-json\/wp\/v2\/categories?post=2464"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.mtin.net\/blog\/wp-json\/wp\/v2\/tags?post=2464"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}