Feeds

WLAN security still dismal – survey

London Calling

  • alert
  • submit to reddit

Securing Web Applications Made Simple and Scalable

The security of London's wireless networks remains pitifully slack.

The second annual survey of WLAN security revealed the number of wireless networks deployed in businesses across London has grown 300 per cent in the past year.

However the increased popularity of wireless networks hasn't been matched by realisation of the importance of extending proper security policies to WLANs.

The RSA- commissioned survey suggests that London businesses are becoming even more vulnerable to malicious hacking because of slack WLAN security. Possible risks include:

  • Computer eavesdropping on company secrets
  • Network disruption
  • Launching denial of service attacks using the cover of the unsuspecting company,

With a hand-held scanner, researchers were able to pick up information from company wireless networks by simply driving around the streets of London. The research identified that 63 per cent of the networks surveyed were left on default configuration, which clearly identifying the company owning the data and where it was coming from.

The overall security picture has barely changed from last year when, using the same methodology, researchers found 67 percent of London companies surveyed left their wireless networks poorly secured against potential attack.

Tim Pickard, strategic marketing director, RSA Security says: "We have seen a proliferation of the use of wireless networks around London, but the steps taken to secure these networks are still woefully inadequate."

"The research shows that many organisations are now at least encrypting their company data by securing wireless networks with virtual private networks but the problem has shifted to other areas."

Among the problems highlighted by the survey are:

  • Failure to effectively encrypt data travelling across wireless networks.
  • Equipment left in default configurations.
  • Insufficiently secured wireless network access points, potentially allowing crackers to set up rogue access points to capture company information.
  • Failure to secure data on wireless enabled laptops.

Independent security consultant Phil Cracknell, who wrote the report, comments: "Researchers stuck to the strict letter of the law in carrying out this survey and did not access any specific data but others clearly may not.



"Hackers could easily use this access to conduct cyber crime or to launch hacking attacks on other companies with complete anonymity."®

Mobile application security vulnerability report

More from The Register

next story
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
NEW, SINISTER web tracking tech fingerprints your computer by making it draw
Have you on YouPorn lately, perhaps? White House website?
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
NUDE SNAPS AGENCY: NSA bods love 'showing off your saucy selfies'
Swapping other people's sexts is a fringe benefit, says Snowden
Own a Cisco modem or wireless gateway? It might be owned by someone else, too
Remote code exec in HTTP server hands kit to bad guys
British data cops: We need greater powers and more money
You want data butt kicking, we need bigger boots - ICO
Crooks fling banking Trojan at Japanese smut site fans
Wait - they're doing online banking with an unpatched Windows PC?
prev story

Whitepapers

Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.