Feeds

Sydney wallows in cesspit of WiFi obsolescence and ignorance

World of Warbiking WiFi sniffing peloton finds lots of unsecured connections

The Essential Guide to IT Transformation

Sophos has brought its Raspberry-Pi-powered World of Warbiking WiFi-sniffing peloton to Sydney and found, as it does everywhere around the world, that some people just can't be bothered with WiFi security.

The Word of Warbiking sees Sophos' head of security research James Lynbe strap a Pi and various WiFi cards to his bicycle and then tour a city to get a feel for which versions of encryption are used by resident WiFi networks. In London, the penetrative peloton found 29.5 per cent were using either the dud Wired Equivalent Privacy (WEP) algorithm, or nothing.

Sydney fared a little better, with just 3.98 per cent running WEP and 23.85 running naked. Wi-Fi Protected Access II (WPA 2) was the most prevalent protocol, with 44.02 per cent of the 34.476 networks found along a 4.2 km route running through the central business district, over the Sydney Harbour Bridge and then through the posh urban enclave of Kirribilli.

Lyne opined, in a lamentably bacon-free post-ride briefing, that Sydney's results and those from around the world come about because some people fall through the cracks despite the security industry's ongoing attempts to scare their pants offeducate them about best practice. That's unhelpful, he said, because it means there's always someone out there running old and/or insecure kit that bad guys can exploit.

Happily, he went nowhere near the usual “Narco-terrorist money launderers are rummaging about in your bank's mainframe over WiFi, now” alarmism. Instead, he pointed out that the a good many people either read email or conduct online banking while using insecure WiFi connections, which presents all manner of opportunity for those who would seek to observe and take advantage of their behaviour.

Sophos' peloton has, to date, visited London, Hanoi, Las Vegas and San Francisco. Results from all cities are quite similar: there's a fair bit of WEP around the world, less WPA-2 and HTTPs than is sensible and a lot of people who either don't care or don't know to care about doing better. ®

Build a business case: developing custom apps

More from The Register

next story
14 antivirus apps found to have security problems
Vendors just don't care, says researcher, after finding basic boo-boos in security software
'Things' on the Internet-of-things have 25 vulnerabilities apiece
Leaking sprinklers, overheated thermostats and picked locks all online
iWallet: No BONKING PLEASE, we're Apple
BLE-ding iPhones, not NFC bonkers, will drive trend - marketeers
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
Multipath TCP speeds up the internet so much that security breaks
Black Hat research says proposed protocol will bork network probes, flummox firewalls
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Israel's Iron Dome missile tech stolen by Chinese hackers
Corporate raiders Comment Crew fingered for attacks
Tor attack nodes RIPPED MASKS off users for 6 MONTHS
Traffic confirmation attack bared users' privates - but to whom?
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Maximize storage efficiency across the enterprise
The HP StoreOnce backup solution offers highly flexible, centrally managed, and highly efficient data protection for any enterprise.