<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Chameleon Wi-Fi Virus in Community and Online Support Services</title>
    <link>https://community.ruckuswireless.com/t5/Community-and-Online-Support/Chameleon-Wi-Fi-Virus/m-p/13383#M570</link>
    <description>Our security folks say "nothing new" - the exploit requires weak infrastructure security which no production network should allow. Normal best-practice security hygiene protects against it.</description>
    <pubDate>Fri, 14 Mar 2014 21:03:06 GMT</pubDate>
    <dc:creator>keith_redfield</dc:creator>
    <dc:date>2014-03-14T21:03:06Z</dc:date>
    <item>
      <title>Chameleon Wi-Fi Virus</title>
      <link>https://community.ruckuswireless.com/t5/Community-and-Online-Support/Chameleon-Wi-Fi-Virus/m-p/13381#M568</link>
      <description>What is Ruckus doing to mitigate the potential infection of APs with the Chameleon Wi-Fi access point virus?  See this link for details on the virus: &lt;A href="http://tinyurl.com/kg3h9wr" rel="nofollow"&gt;http://tinyurl.com/kg3h9wr&lt;/A&gt;</description>
      <pubDate>Thu, 13 Mar 2014 15:01:51 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/Community-and-Online-Support/Chameleon-Wi-Fi-Virus/m-p/13381#M568</guid>
      <dc:creator>troy_mclennan</dc:creator>
      <dc:date>2014-03-13T15:01:51Z</dc:date>
    </item>
    <item>
      <title>Re: Chameleon Wi-Fi Virus</title>
      <link>https://community.ruckuswireless.com/t5/Community-and-Online-Support/Chameleon-Wi-Fi-Virus/m-p/13382#M569</link>
      <description>For the truly paranoid, I've validated the link above is legit ;)
&lt;BR /&gt;&lt;BR /&gt;
I've asked our security team to help address the concern. Stay tuned.</description>
      <pubDate>Thu, 13 Mar 2014 15:10:15 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/Community-and-Online-Support/Chameleon-Wi-Fi-Virus/m-p/13382#M569</guid>
      <dc:creator>keith_redfield</dc:creator>
      <dc:date>2014-03-13T15:10:15Z</dc:date>
    </item>
    <item>
      <title>Re: Chameleon Wi-Fi Virus</title>
      <link>https://community.ruckuswireless.com/t5/Community-and-Online-Support/Chameleon-Wi-Fi-Virus/m-p/13383#M570</link>
      <description>Our security folks say "nothing new" - the exploit requires weak infrastructure security which no production network should allow. Normal best-practice security hygiene protects against it.</description>
      <pubDate>Fri, 14 Mar 2014 21:03:06 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/Community-and-Online-Support/Chameleon-Wi-Fi-Virus/m-p/13383#M570</guid>
      <dc:creator>keith_redfield</dc:creator>
      <dc:date>2014-03-14T21:03:06Z</dc:date>
    </item>
    <item>
      <title>Re: Chameleon Wi-Fi Virus</title>
      <link>https://community.ruckuswireless.com/t5/Community-and-Online-Support/Chameleon-Wi-Fi-Virus/m-p/13384#M571</link>
      <description>My concern is a have a lot of Customers in the hospitality business that run unencrypted Wi-Fi for ease of use of guests.  Does Chameleon put these Customers at risk?</description>
      <pubDate>Mon, 17 Mar 2014 14:23:58 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/Community-and-Online-Support/Chameleon-Wi-Fi-Virus/m-p/13384#M571</guid>
      <dc:creator>troy_mclennan</dc:creator>
      <dc:date>2014-03-17T14:23:58Z</dc:date>
    </item>
    <item>
      <title>Re: Chameleon Wi-Fi Virus</title>
      <link>https://community.ruckuswireless.com/t5/Community-and-Online-Support/Chameleon-Wi-Fi-Virus/m-p/13385#M572</link>
      <description>The exploit relies on well known default passwords, so good password practices on the controller take care of that.</description>
      <pubDate>Mon, 17 Mar 2014 14:41:14 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/Community-and-Online-Support/Chameleon-Wi-Fi-Virus/m-p/13385#M572</guid>
      <dc:creator>keith_redfield</dc:creator>
      <dc:date>2014-03-17T14:41:14Z</dc:date>
    </item>
  </channel>
</rss>

