Feeds

Secure the Wireless Network firmware

Intel WEP Schlep

  • alert
  • submit to reddit

Website security in corporate America

Intel Developer Forum Security issues surrounding wireless networking can be addressed without upgrading hardware, Intel said today.

The future ubiquity of wireless networking has been a key theme of the IDF this week, with much talk of a mobile computing future where laptop computers automatically select the best connection via either a wireless LAN or high-speed mobile network.

This is an attractive vision but there's serious concerns that recently released tools, such as Airsnort, will expose the insecurity of wireless networks, particularly since the security of installed networks has repeatedly been described to us as "flaky".

Encryption experts, among them Adi Shamir, the co-inventor of RSA, have highlighted cryptographic weaknesses in the WEP (Wired Equivalent Protocol) security that ships with 802.11b. Best practice calls for the use of virtual private networking techniques to encrypt data flowing over wireless Lans but this is often not followed.

Carol Jacobson, manager of Intel's wireless initiative, said weaknesses in WEP can be addressed by upgrading the firmware on existing kit and won't entail a forklift upgrade of kit (just better key management technology).

The next generation 802.11i standard for wireless networking will provide a long-term solution, she added.

Another concern raised during a panel on client initiatives at IDF was fears about interference arising from the number of different technologies using the 2.4GHz band. Bluetooth devices, 802.11b wireless networking kit, some US mobile operators and even devices from Radio Shack designed to pipe TV signals through the home use the over-occupied band.

According to Jackson, Bluetooth devices and 802.11b wireless equipment do not interfere with each other in airport environments and the like, where their use is emerging. However she admitted a few devices in the IDF technology showcase had "stepped on each other". Hmmm.®

Related IDF Stories

Intel goes bananas over Banias
2GHz P4 will turn us all into DJs
Wintel touts the next leap in computing
Project Jackson breaks cover - Xeon in 2002, Itanic later
McKinley, Deerfield speeds and feeds

Protecting users from Firesheep and other Sidejacking attacks with SSL

More from The Register

next story
Early result from Scots indyref vote? NAW, Jimmy - it's a SCAM
Anyone claiming to know before tomorrow is telling porkies
TOR users become FBI's No.1 hacking target after legal power grab
Be afeared, me hearties, these scoundrels be spying our signals
Home Depot: 56 million bank cards pwned by malware in our tills
That's about 50 per cent bigger than the Target tills mega-hack
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
NORKS ban Wi-Fi and satellite internet at embassies
Crackdown on tardy diplomatic sysadmins providing accidental unfiltered internet access
UK.gov lobs another fistful of change at SME infosec nightmares
Senior Lib Dem in 'trying to be relevant' shocker. It's only taxpayers' money, after all
Critical Adobe Reader and Acrobat patches FINALLY make it out
Eight vulns healed, including XSS and DoS paths
Spies would need SUPER POWERS to tap undersea cables
Why mess with armoured 10kV cables when land-based, and legal, snoop tools are easier?
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.