Hacking Through the Wireless Jungle

    Date19 Apr 2002
    CategoryHacks/Cracks
    2971
    Posted ByAnthony Pell
    Each time technology advances, a new underworld of cyber criminals appears, looking to exploit the latest systems. As companies strive to give employees more mobility -- without sacrificing productivity -- hackers have begun to slither around the wireless landscape, readying new assaults. . . . Each time technology advances, a new underworld of cyber criminals appears, looking to exploit the latest systems. As companies strive to give employees more mobility -- without sacrificing productivity -- hackers have begun to slither around the wireless landscape, readying new assaults.

    "I have heard stories of people driving around the valley sniffing for WLANs (wireless local area networks) and getting access to resources, but no one is likely to step forward and say, 'Yes, we have been hacked,'" AMR Research analyst Dennis Gaughan told Wireless NewsFactor. "That is no different than the wired world."

    But even those companies without authorized WLANs are finding themselves burdened with wireless security problems.

    "The challenge that many IT shops face is that rogue users or departments are going out and buying the WLAN gear and installing it without understanding the security risks," Gaughan said.

    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"13","type":"x","order":"1","pct":52,"resources":[]},{"id":"88","title":"Should be more technical","votes":"4","type":"x","order":"2","pct":16,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"8","type":"x","order":"3","pct":32,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.