Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Applications
    • Applications
    • Cybersecurity
    • IT Management
    • Mobile
    • PC Hardware

    RSA Study: Wireless Network Security Tightens Up

    Written by

    Matt Hines
    Published May 25, 2006
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      A new study published by researchers at RSA Security finds that as the number of wireless networks located in some of the worlds largest cities is growing, so is the number of those systems protected by encryption or other IT defenses.

      While in years past researchers found that businesses and consumers were often setting up wireless networks without thoroughly applying security measures, RSA said its most recent tests found that many people are taking additional steps to make sure that their systems are protected from unauthorized use and so-called war-driving attacks.

      Authentication and encryption specialist RSA, with help from an independent research firm, gathered its information by engaging in war-driving in cities such as London, New York and Paris.

      The process involves moving around the city in a vehicle while searching for wireless hotspots on a laptop, and then trying to break into the systems to determine whether they are defended.

      Criminals are known to engage in the scheme to gain access to unprotected corporate or home networks where they can infiltrate user devices or carry out attacks using the unmonitored Internet connections.

      In addition to testing security, RSA also tracked the number of wireless networks it could find on its war-driving missions. According to the study, the largest yearly increase in hotspots was found in London, where the company detected 57 percent more wireless access points than found by RSAs similar study in 2005. New York now has 20 percent more wireless networks than it had in 2005.

      RSA did not provide year-over-year results for Paris, as it did not test there in 2005, but the company said that since 2004 the city has seen the number of wireless systems grow by an impressive 119 percent.

      Paris also claimed a leadership spot in the percentage of wireless access points protected by WEP (Wired Equivalent Privacy) security settings, the technology most often included by networking gear makers as a default defense mechanism in their products. Roughly 78 percent of all WLAN (wireless LAN) and Wi-Fi systems found by RSA in Paris were encrypted with WEP, compared to only 69 percent of the systems RSA located in the city in 2004.

      In London, RSA found that WEP usage increased to 74 percent of all networks in 2006, up from 65 percent in 2005, while 75 percent of networks found in New York use WEP defenses, up from 62 percent in 2005.

      /zimages/4/28571.gifFor advice on how to secure your network and applications, as well as the latest security news, visit Ziff Davis Internets Security IT Hub.

      Despite the improvement in the volume of protected systems, RSA indicated that the large number of unencrypted networks remains a troubling situation for all IT users. Malicious parties who gain access to such networks can use them for everything from breaking into the data stores of the computers they are connected to, to using them to deliver malware code to other systems, or to distribute illegal materials such as child pornography.

      Another security issue still present in many wireless hotspots is the use of the systems default network settings, which can make it easier for outsiders to infiltrate the access points, RSA said. In London, 22 percent of all the WLANs the company detected were still using their default settings, an improvement on 2005s figure of 26 percent.

      In New York, some 28 percent of all wireless networks used the default settings, compared to 30 percent last year, while Paris led the way again with only 21 percent set to default, compared to 39 percent in 2004.

      Researchers said they were encouraged to see the proportion of protected wireless networks increasing even as the systems take off, and warned that firms with unprotected wireless access points will eventually pay the price.

      “While the halting of what appeared to be a downward spiral is good news, we should not forget that around a quarter of business networks in these cities remain open to attack,” Tim Pickard, vice president of international marketing at RSA Security, based in Bedford, Mass., said in the report. “Such companies risk the theft of confidential and sensitive data, planting of malicious code such as viruses and back-door Trojans, and potentially allowing their systems to be used as a launch pad for denial-of-service attacks and other security breaches; wireless security may have been bolstered, but we cant relax yet.”

      /zimages/4/28571.gifAnti-fraud products steal the show at the RSA Conference in San Jose, Calif. Click here to read more.

      RSA also highlighted the growing popularity of so-called rogue hotspots, or temporary wireless access points designed to look like legitimate networks in order to lure users and steal their data for purposes of identity theft.

      For example, researchers at IT consultancy Capgemini UK, based in Surrey, England, built a rogue hotspot to see if outsiders could tell the difference between it and genuine access points. Company officials said a significant number of devices attempted to connect to the illegitimate network.

      “Rogue hotspots currently constitute one of the most serious and most likely vehicles for wireless security breaches—they are easy to set up and an attacker is almost guaranteed a valuable crop of data in a short period of time,” said Phil Cracknell, a security consultant at Capgemini UK. “For this reason, they could be used as the next platform for phishing attacks and identity theft. In order to prevent this, all mobile users—either business or personal—need to be educated about the potential risk from rogue hotspots and taught not to send confidential user names, passwords and personal information over unencrypted networks.”

      /zimages/4/28571.gifCheck out eWEEK.coms for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at eWEEK.com Security Center Editor Larry Seltzers Weblog.

      Matt Hines
      Matt Hines

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×