Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    WLAN Data on the Loose

    Written by

    Carmen Nobel
    Published May 13, 2002
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      While an anonymous message on a security mailing list has reignited the hysteria over the security of wireless LANs, IT managers and industry analysts acknowledge that the ongoing wireless security problem has less to do with the equipments security features than with the users failure to use them.

      The 802.11b WLAN protocol, or Wi-Fi, includes an encryption algorithm known as WEP (Wired Equivalent Privacy). But many users fail to enable it.

      “I would argue there is a lack of security awareness in networking,” said Jason Smolek, an analyst at International Data Corp., in Framingham, Mass. “Typically, network administrators have not been trained in WLAN.”

      IT managers who know something about WLANs said security education is turning into a big part of their jobs.

      “Most WLAN users dont really understand the open nature of the wireless medium,” said Nathan Lemmon, senior technical adviser for wireless systems development at FedEx Corporate Services, a division of FedEx Corp. in Memphis, Tenn., which has deployed wireless networks across several campuses nationwide. “Educating the FedEx corporate user about the peculiarities of wireless is a big part of my job. Security just happens to be the most important aspect of wireless, but thats from the corporations perspective, not necessarily the users.”

      Even enabled, WEP has key exchange problems that can lead to security gaps, and the IEEE is working on a security protocol that may best WEP. But WEP-enabled networks are still more secure than networks without WEP.

      Not knowing how to enable WEP, or just not bothering, can lead to trouble.

      Recently, someone posted an anonymous message to the Vuln-Dev security list maintained at SecurityFocus.com that recounted a recent trip to a Best Buy retail store to purchase an 802.11b WLAN card for a laptop computer.

      The author installed the card and its drivers while sitting in the Best Buy parking lot and immediately noticed that the light on the card indicating network traffic was illuminated. Using a wireless packet-sniffing application called Kismet, the author captured numerous unencrypted packets, which turned out to be coming from Best Buy.

      The frenzy has escalated to such a degree that Best Buy Co. Inc., of Eden Prairie, Minn., last week decided to take all its wireless cash registers offline. The cash registers were manufactured by Symbol Inc., which includes basic WEP security in all its WLAN products. But the customer had neglected to turn it on. Best Buy did not return a phone call seeking comment.

      “If you dont mind having your internal corporate data published on the front page of The New York Times or Boston Globe, then you dont need WLAN security and encryption,” said Kevin Baradet, network systems director at the S.C. Johnson Graduate School of Management at Cornell University, in Ithaca, N.Y., and an eWeek Corporate Partner.

      The Vuln-Dev message about the Best Buy hack drew dozens of replies, many from people who reported that they, too, had been able to capture WLAN traffic from the parking lots of some large retailers. Others, however, pointed out that this was an old issue and was well-known among crackers.

      Indeed, hacking into insecure wireless networks is nothing new. In fact, some networking companies now sell products that detect insecure networks before a hacker uses a program such as Kismet.

      Enterprise security provider Solutionary Inc. recently created a map of Omaha, Neb., that revealed insecure WLANs all over the city.

      AirMagnet Inc. late last month introduced a handheld WLAN analyzer that detects a number of problems, including security gaps. Company officials said they used the product to find insecure access points virtually everywhere they went while they were on their product road tour.

      The moderator of the mailing list said he has no reason to doubt the veracity of the message.

      “Since then, multiple people have confirmed at minimum that lots of the big retailers are indeed using 802.11b,” said the lists moderator, who goes by the handle Blue Boar. “Best Buy has done the smart thing by shutting off their wireless until they figure out if they have a problem or not. Someone will probably report in about other retailers.”

      Security experts say that even if Best Buy or other retailers are broadcasting credit card numbers in clear text, its the retailer that is exposed, not consumers.

      “The impact on the consumer is almost nothing,” said Daniel Baley, general manager of wireless networking at Ntru Cryptosystems Inc., a maker of wireless encryption products based in Burlington, Mass. “The customers liability is $50 on [fraudulent] purchases. But Best Buy clearly has an exposure here.”

      Carmen Nobel
      Carmen Nobel

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×