Six of ten WiFi networks are insecure

Powered by SC Magazine
 

Almost 60 percent of WiFi networks have no security system at all, according to Panda Software in its "Security in Wireless Networks" report.

The conclusions of the study are clear: Security on WiFi networks is insufficient, said Panda. While the most widely used protocol for the security of the network, Wired Equivalent Privacy, has many vulnerabilities, the most effective protocols, such as WiFi Protected Access or WPA-PSK, are hardly used at all, the report reveals.

PandaLabs was able to verify this through a series of war driving surveys carried out internationally. Sixty percent of networks lacked protection, according to the results. 

"This survey highlights security levels in wireless networks, examining security methods and how their design limitations, or even incorrect configurations, can make them vulnerable," said Luis Corrons, director of PandaLabs. "This will enable users to avoid the dangers that lie in waiting if the correct measures are not taken while deploying a WiFi network.

"Although wireless networks have not been exploited extensively for malicious ends, it would seem clear that users are not sufficiently aware of the threat this poses to security. This is a highly sensitive issue for companies - if corporate networks using WiFi are not correctly protected, the scope of the potential attack is increasingly dangerous, as security could be compromised across the company because the WiFi networks represent an entry point for malware and targeted attacks," Corrons added.

Copyright © SC Magazine, US edition


 
 
 
Top Stories
Meet FABACUS, Westpac's first computer
GE225 operators celebrate gold anniversary.
 
NSW Govt gets ready to throw out the floppy disks
[Opinion] Dominic Perrottet says its time for government to catch up.
 
iiNet facing new copyright battle with Hollywood
Fighting to protect customer details.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  26%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  21%
 
End user computing (desktops, mobiles, apps)
  15%
 
Software development
  26%
TOTAL VOTES: 343

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  58%
 
No
  42%
TOTAL VOTES: 143

Vote