Close
  • Latest News
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Applications
    • Applications
    • Cybersecurity
    • IT Management
    • Mobile
    • PC Hardware

    RSA Study: Wireless Network Security Tightens Up

    By
    Matt Hines
    -
    May 25, 2006
    Share
    Facebook
    Twitter
    Linkedin

      A new study published by researchers at RSA Security finds that as the number of wireless networks located in some of the worlds largest cities is growing, so is the number of those systems protected by encryption or other IT defenses.

      While in years past researchers found that businesses and consumers were often setting up wireless networks without thoroughly applying security measures, RSA said its most recent tests found that many people are taking additional steps to make sure that their systems are protected from unauthorized use and so-called war-driving attacks.

      Authentication and encryption specialist RSA, with help from an independent research firm, gathered its information by engaging in war-driving in cities such as London, New York and Paris.

      The process involves moving around the city in a vehicle while searching for wireless hotspots on a laptop, and then trying to break into the systems to determine whether they are defended.

      Criminals are known to engage in the scheme to gain access to unprotected corporate or home networks where they can infiltrate user devices or carry out attacks using the unmonitored Internet connections.

      In addition to testing security, RSA also tracked the number of wireless networks it could find on its war-driving missions. According to the study, the largest yearly increase in hotspots was found in London, where the company detected 57 percent more wireless access points than found by RSAs similar study in 2005. New York now has 20 percent more wireless networks than it had in 2005.

      RSA did not provide year-over-year results for Paris, as it did not test there in 2005, but the company said that since 2004 the city has seen the number of wireless systems grow by an impressive 119 percent.

      Paris also claimed a leadership spot in the percentage of wireless access points protected by WEP (Wired Equivalent Privacy) security settings, the technology most often included by networking gear makers as a default defense mechanism in their products. Roughly 78 percent of all WLAN (wireless LAN) and Wi-Fi systems found by RSA in Paris were encrypted with WEP, compared to only 69 percent of the systems RSA located in the city in 2004.

      In London, RSA found that WEP usage increased to 74 percent of all networks in 2006, up from 65 percent in 2005, while 75 percent of networks found in New York use WEP defenses, up from 62 percent in 2005.

      /zimages/4/28571.gifFor advice on how to secure your network and applications, as well as the latest security news, visit Ziff Davis Internets Security IT Hub.

      Despite the improvement in the volume of protected systems, RSA indicated that the large number of unencrypted networks remains a troubling situation for all IT users. Malicious parties who gain access to such networks can use them for everything from breaking into the data stores of the computers they are connected to, to using them to deliver malware code to other systems, or to distribute illegal materials such as child pornography.

      Another security issue still present in many wireless hotspots is the use of the systems default network settings, which can make it easier for outsiders to infiltrate the access points, RSA said. In London, 22 percent of all the WLANs the company detected were still using their default settings, an improvement on 2005s figure of 26 percent.

      In New York, some 28 percent of all wireless networks used the default settings, compared to 30 percent last year, while Paris led the way again with only 21 percent set to default, compared to 39 percent in 2004.

      Researchers said they were encouraged to see the proportion of protected wireless networks increasing even as the systems take off, and warned that firms with unprotected wireless access points will eventually pay the price.

      “While the halting of what appeared to be a downward spiral is good news, we should not forget that around a quarter of business networks in these cities remain open to attack,” Tim Pickard, vice president of international marketing at RSA Security, based in Bedford, Mass., said in the report. “Such companies risk the theft of confidential and sensitive data, planting of malicious code such as viruses and back-door Trojans, and potentially allowing their systems to be used as a launch pad for denial-of-service attacks and other security breaches; wireless security may have been bolstered, but we cant relax yet.”

      /zimages/4/28571.gifAnti-fraud products steal the show at the RSA Conference in San Jose, Calif. Click here to read more.

      RSA also highlighted the growing popularity of so-called rogue hotspots, or temporary wireless access points designed to look like legitimate networks in order to lure users and steal their data for purposes of identity theft.

      For example, researchers at IT consultancy Capgemini UK, based in Surrey, England, built a rogue hotspot to see if outsiders could tell the difference between it and genuine access points. Company officials said a significant number of devices attempted to connect to the illegitimate network.

      “Rogue hotspots currently constitute one of the most serious and most likely vehicles for wireless security breaches—they are easy to set up and an attacker is almost guaranteed a valuable crop of data in a short period of time,” said Phil Cracknell, a security consultant at Capgemini UK. “For this reason, they could be used as the next platform for phishing attacks and identity theft. In order to prevent this, all mobile users—either business or personal—need to be educated about the potential risk from rogue hotspots and taught not to send confidential user names, passwords and personal information over unencrypted networks.”

      /zimages/4/28571.gifCheck out eWEEK.coms for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at eWEEK.com Security Center Editor Larry Seltzers Weblog.

      Matt Hines

      MOST POPULAR ARTICLES

      Big Data and Analytics

      Alteryx’s Suresh Vittal on the Democratization of...

      James Maguire - May 31, 2022 0
      I spoke with Suresh Vittal, Chief Product Officer at Alteryx, about the industry mega-shift toward making data analytics tools accessible to a company’s complete...
      Read more
      Cybersecurity

      Visa’s Michael Jabbara on Cybersecurity and Digital...

      James Maguire - May 17, 2022 0
      I spoke with Michael Jabbara, VP and Global Head of Fraud Services at Visa, about the cybersecurity technology used to ensure the safe transfer...
      Read more
      Applications

      Cisco’s Thimaya Subaiya on Customer Experience in...

      James Maguire - May 10, 2022 0
      I spoke with Thimaya Subaiya, SVP and GM of Global Customer Experience at Cisco, about the factors that create good customer experience – and...
      Read more
      Cloud

      IGEL CEO Jed Ayres on Edge and...

      James Maguire - June 14, 2022 0
      I spoke with Jed Ayres, CEO of IGEL, about the endpoint sector, and an open source OS for the cloud; we also spoke about...
      Read more
      Cloud

      Yotascale CEO Asim Razzaq on Controlling Multicloud...

      James Maguire - May 5, 2022 0
      Asim Razzaq, CEO of Yotascale, provides guidance on understanding—and containing—the complex cost structure of multicloud computing. Among the topics we covered:  As you survey the...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2022 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×