Hackers own all Wi-Fi hot-spot data

Wednesday, 13 August 2003, 12:30 AM EST

No unencrypted data passing over public access Wi-Fi hot spots is safe from the prying eyes of hackers using simple packet-sniffing tools, industry analysts have claimed.

According to analyst the Butler Group, existing security measures built into 802.11x wireless infrastructures are simply not good enough to protect data.

"Forget Wired Equivalent Privacy and the new Wi-Fi Protected Access for public Wi-Fi hot spots; we must assume that any unencrypted traffic transmitted or received by our wireless adaptor is being sniffed by someone, somewhere," the analyst said in its latest review of the industry.

"There's no doubt that Wi-Fi sniffing is easy to do -- maybe someone will be sniffing the next wireless network you connect to. But the real question is, what will that someone do with the information they sniff?

Butler Group advised that there are ways to protect enterprises from easily available packet-sniffing tools like dsniff, one of which is to deploy 'client-encryption' technology on all PCs, laptops, and mobile devices used to access sensitive corporate systems.

[ Read more ]




Spotlight

USBdriveby: Compromising computers with a $20 microcontroller

Posted on 19 December 2014.  |  Security researcher Samy Kamkar has devised a fast and easy way to compromise an unlocked computer and open a backdoor on it: a simple and cheap ($20) pre-programmed Teensy microcontroller.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Fri, Dec 19th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //