Is Your Wi-Fi Network Open to Intrusion?

Security has been an ongoing concern among wireless LANs users since their emergence in the middle 1990s. While vendors have worked diligently to close up any holes, new ones seem to emerge on a regular period, and one is now coming to light that could impact many small and medium businesses.

Paul Korzeniowski, Contributor

August 27, 2009

1 Min Read

Security has been an ongoing concern among wireless LANs users since their emergence in the middle 1990s. While vendors have worked diligently to close up any holes, new ones seem to emerge on a regular period, and one is now coming to light that could impact many small and medium businesses.Almost as soon as they began shipping, Wi-Fi connections were deemed insecure. Initially, the underlying security checks and encryption algorithms were simple and easy to break. The wireless LAN industry has developed a variety of different security approaches -- WEP, Wi-Fi Protected Access (WPA) and WPA 2  that have had varying levels of success. Recently, Japanese computer scientists developed a way to break WPA security in as little as one minute, which means companies wireless connections could be open to hackers.

On the plus side, the attacks do not work with any WPA 2 devices using the WPA the Advanced Encryption Standard (AES) algorithm. Such products started shipping in the summer of 2006, so newer WLAN access points, switches, and routers should be safe. However, businesses need to check all of their Wi-Fi devices, identify any WPA systems, and either upgrade them to WPA 2 or dump them. Once that process is complete, their wireless LANs should be safe  at least until the next Wi-Fi security hole is identified.

Read more about:

2009

About the Author(s)

Paul Korzeniowski

Contributor

Paul Korzeniowski is a freelance contributor to InformationWeek who has been examining IT issues for more than two decades. During his career, he has had more than 10,000 articles and 1 million words published. His work has appeared in the Boston Herald, Business 2.0, eSchoolNews, Entrepreneur, Investor's Business Daily, and Newsweek, among other publications. He has expertise in analytics, mobility, cloud computing, security, and videoconferencing. Paul is based in Sudbury, Mass., and can be reached at [email protected]

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights