Feeds

Secure the Wireless Network firmware

Intel WEP Schlep

  • alert
  • submit to reddit

Build a business case: developing custom apps

Intel Developer Forum Security issues surrounding wireless networking can be addressed without upgrading hardware, Intel said today.

The future ubiquity of wireless networking has been a key theme of the IDF this week, with much talk of a mobile computing future where laptop computers automatically select the best connection via either a wireless LAN or high-speed mobile network.

This is an attractive vision but there's serious concerns that recently released tools, such as Airsnort, will expose the insecurity of wireless networks, particularly since the security of installed networks has repeatedly been described to us as "flaky".

Encryption experts, among them Adi Shamir, the co-inventor of RSA, have highlighted cryptographic weaknesses in the WEP (Wired Equivalent Protocol) security that ships with 802.11b. Best practice calls for the use of virtual private networking techniques to encrypt data flowing over wireless Lans but this is often not followed.

Carol Jacobson, manager of Intel's wireless initiative, said weaknesses in WEP can be addressed by upgrading the firmware on existing kit and won't entail a forklift upgrade of kit (just better key management technology).

The next generation 802.11i standard for wireless networking will provide a long-term solution, she added.

Another concern raised during a panel on client initiatives at IDF was fears about interference arising from the number of different technologies using the 2.4GHz band. Bluetooth devices, 802.11b wireless networking kit, some US mobile operators and even devices from Radio Shack designed to pipe TV signals through the home use the over-occupied band.

According to Jackson, Bluetooth devices and 802.11b wireless equipment do not interfere with each other in airport environments and the like, where their use is emerging. However she admitted a few devices in the IDF technology showcase had "stepped on each other". Hmmm.®

Related IDF Stories

Intel goes bananas over Banias
2GHz P4 will turn us all into DJs
Wintel touts the next leap in computing
Project Jackson breaks cover - Xeon in 2002, Itanic later
McKinley, Deerfield speeds and feeds

Endpoint data privacy in the cloud is easier than you think

More from The Register

next story
14 antivirus apps found to have security problems
Vendors just don't care, says researcher, after finding basic boo-boos in security software
Microsoft's Euro cloud darkens: US FEDS can dig into foreign servers
They're not emails, they're business records, says court
'Things' on the Internet-of-things have 25 vulnerabilities apiece
Leaking sprinklers, overheated thermostats and picked locks all online
iWallet: No BONKING PLEASE, we're Apple
BLE-ding iPhones, not NFC bonkers, will drive trend - marketeers
Multipath TCP speeds up the internet so much that security breaks
Black Hat research says proposed protocol will bork network probes, flummox firewalls
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
Plug and PREY: Hackers reprogram USB drives to silently infect PCs
BadUSB instructs gadget chips to inject key-presses, redirect net traffic and more
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
prev story

Whitepapers

7 Elements of Radically Simple OS Migration
Avoid the typical headaches of OS migration during your next project by learning about 7 elements of radically simple OS migration.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Solving today's distributed Big Data backup challenges
Enable IT efficiency and allow a firm to access and reuse corporate information for competitive advantage, ultimately changing business outcomes.
A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?