Search By Topic:

Popular Topics:



News & Features | Feb 23rd, 2011

Study Finds Wireless Networks Are Wide Open to Hackers

Jan Legnitto

Do you think most wireless networks are safe from hackers? If you do, the results of a recent ethical hacking experiment might change your mind. At home and at hotspots, it found that wifi use can be risky business.

Nearly 40,000 wireless networks run a high risk of being penetrated by hackers, according to the new study commissioned by the British life assistance company CPP.

The company hired ethical hacker and Senior Vice President of Cryptocard Jason Hart to travel around six British cities. Hart used basic wardriving equipment – a laptop and widely available software – to identify unsecured private wireless networks. What he found was shocking. Almost a quarter of the wifi networks had no passwords at all, making them immediately accessible to hackers.

Even password protected wireless networks with the old WEP encryption standard are not secure. They can be hacked in a matter of minutes. Despite that, 82% of Brits believe their wifi networks are protected.

If penetrated, the wireless networks could be used for everything from buying pornography to selling stolen goods and accessing victims’ personal information to commit identity theft and credit fraud.

We wondered whether home wireless network security is any better on this side of the ocean. The answer wasn’t reassuring. “CPP’s road survey findings are consistent with what I’ve seen while performing informal scans across the U.S. over the years,” says Lisa Phifer, president of Core Competence, a network security consulting company. “Although the percentage of wireless networks using security has grown, the wireless network database indicates that one third of them still don’t use encryption.” Phifer says one in ten operate with default settings, which makes hacking easy.

The CPP study also revealed the dangers of using public wifi networks to go online. Ethical hackers were able to “harvest” user names and passwords from unsuspecting wifi users at coffee shops and restaurants at the rate of 350 an hour.

The experiment found that 200 people unknowingly logged on to fake wifi networks within an hour, risking the exposure of their personal financial information to hackers.

Phifer has found similar wireless security issues in the U.S. “When I’ve tested mobile wifi access points in public places like cafes and conference centers, I often see users immediately trying to connect to my wireless network,” she says. According to Phifer, that’s because wifi  enabled devices are far too friendly to strangers. “Many users have no idea what their laptops and smartphones are trying to connect to without any prompting or permission,” she says.

How to Protect Yourself at Home and at Hotspots

  • Use WPA instead of no encryption or WEP encryption. The old WEP (Wired Equivalency Privacy) encryption has weaknesses that make it an easy target for hackers. WPA (Wifi Protected Access), or even better, WPA2 has stronger encryption.
  • Change the default wireless network name and administrative password. Network devices generally come with default names and passwords which are easy for hackers to find online.
  • Make sure your firewall is turned on and your antivirus software is up to date. It can reduce the damage hackers can inflict if they try to access your network.
  • Only allow authorized users to access your network. Restrict access by filtering MAC (Media Access Control) addresses. This will discourage accidental connections from neighbors, but not serious attacks by sophisticated hackers.
  • Turn off wireless connectivity when you’re not using it.
  • Disable printer and file sharing options when you’re at a hotspot.
  • Avoid logging into public hotspots that don't have secure login pages, (indicated by the padlock in your browser and "https" in the URL).
  • Use a VPN (virtual private network) like PRIVATE WiFi™ to insure that your information is transmitted through an invisible secure tunnel.

If you’ve been hacked at home or at a hotspot, we’d like to hear your story. Tell us what happened to you.

Associated Topics:

Associated Topics:


Related Posts

Tips to Protect Your Digital Identity

Thought Leadership
Nikki Junker | Apr 29th, 2015

Within the last decade, our senses of self and identity have made a major shift.  Whether we’ve noticed it or not, the items that used to define our identities have gone from hard copy items, such as birth certificates and Social Security cards, to online banking passwords, Facebook logins, and mobile wallets stored in our smartphones.  While we still need to safeguard and protect those hard copy documents, we also have to focus on our digital identities. Read More

New Hotel WiFi Vulnerability

Thought Leadership
Alok Kapur | Apr 9th, 2015

Earlier this year, the FTC declared a critical announcement for travelers: hotel WiFi is dangerous. Many people assume that because they are paying for it the network must be safe, but that is a dangerous assumption. Hotel WiFi networks are completely insecure; the bad news is that a new exposure in hotel WiFi has just been found. Read more to find out how you can keep yourself protected. Read More

Cyber Security Training Just As Important at C-Level

Thought Leadership
Eva Velasquez | Mar 24th, 2015

The need for better online safety training to prevent data breaches is a hot topic right now. Coupled with stronger computer and network policies, companies want to prevent the hacking events that leave businesses susceptible to a data breach. While it’s no secret that employees in both the private sector and government service can unintentionally expose organizations to hackers, what is surprising is a report by Wombat Security that shows that 33% of CEOs fell for phishing attacks that led to network access. Why are they falling for this kind of internet activity? Read More

E-filing: The Fastest and Safest Way to File Taxes?

Thought Leadership
Eva Velasquez | Mar 9th, 2015

E-filing your annual return to the IRS offers speed and convenience and when coupled with industry-approved software that can plug in the values for you, a lot of the headaches traditionally associated with doing your taxes are eliminated. However, there are some potential dangers that you should be aware of, such as insecure public WiFi networks and online tax fraud. Read More


Thank you for subscribing to our newsletters

Your email has been added to our system. You will be e-mailed shortly with a request to confirm your membership. Please make sure to click the link in that message to confirm your subscription.