Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


11:00 AM
Connect Directly

Survey: 1 in 4 WLANs Unsecured

RSA survey finds more WLANs, but not much security

Up to 25 percent of business wireless LANs don't encrypt their traffic -- and that's only if you count the much-maligned Wireless Equivalency Protocol (WEP) as security, according to a new survey that will be released today by RSA Security.

"One of four business networks are not providing security at all," says Toffer Winslow, vice president of product management for encryption company RSA, the security division of EMC. "WEP today doesn't really constitute security, but we're being charitable counting it as 'secure.'"

RSA focused its study on three cities -- London, New York, and Paris. The study found major growth. In London, the number of wireless APs grew by 160 percent from last year, in New York by 49 percent, and in Paris by 44 percent.

Much of that growth came from the business side. "Business access points are growing more than hotspots," Winslow says.

The good news is that the number of vulnerable WLANs has dropped from last year. The figures in London went from 26 percent in 2006 to 19 percent in 2007; New York dropped from 25 percent to 24 percent, and Paris dropped from 22 percent to 20 percent.

"But in absolute numbers, there are more unsecured business networks out there than before, because there's a high underlying growth," RSA's Winslow says.

Winslow was disturbed that many of these businesses don't bother to change the default administrative user name and password on their wireless equipment. "They don't go in and change those settings, so it's reasonable for a hacker to do a sniffer test and see if he can use the default settings," he says. "In London, 30 percent of all businesses and consumer WLANs were using default settings."

What about advanced encryption, such as WPA and 802.11i? In New York, 49 percent of business APs were implementing such advanced encryption. About 48 percent use these technologies in London, and 41 percent in Paris.

The RSA report points out that users could easily connect to an unsecured business WLAN rather than a wireless hotspot -- either on purpose or accidentally -- opening the organization up to serious risks such as data theft, identity theft, or attacks such as denial of service.

RSA recommends that when mobile users must connect via a hotspot, they should use their corporate VPN connection and WEP or other advanced encryption, as well as strong authentication. He says RSA has a similar policy, so that when he jumps on the corporate WLAN while he's in a meeting, for instance, he uses a VPN link and SecureID for authentication.

— Kelly Jackson Higgins, Senior Editor, Dark Reading

  • RSA Security Inc. (Nasdaq: EMC)
  • World Cellular Information Service (WCIS) Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Newest First  |  Oldest First  |  Threaded View
    RDP Bug Takes New Approach to Host Compromise
    Kelly Sheridan, Staff Editor, Dark Reading,  7/18/2019
    The Problem with Proprietary Testing: NSS Labs vs. CrowdStrike
    Brian Monkman, Executive Director at NetSecOPEN,  7/19/2019
    Register for Dark Reading Newsletters
    White Papers
    Cartoon Contest
    Current Issue
    Building and Managing an IT Security Operations Program
    As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
    Flash Poll
    The State of IT Operations and Cybersecurity Operations
    The State of IT Operations and Cybersecurity Operations
    Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    PUBLISHED: 2019-07-23
    ServiceStack ServiceStack Framework 4.5.14 is affected by: Cross Site Scripting (XSS). The impact is: JavaScrpit is reflected in the server response, hence executed by the browser. The component is: the query used in the GET request is prone. The attack vector is: Since there is no server-side valid...
    PUBLISHED: 2019-07-23
    Voice Builder Prior to commit c145d4604df67e6fc625992412eef0bf9a85e26b and f6660e6d8f0d1d931359d591dbdec580fef36d36 is affected by: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection'). The impact is: Remote code execution with the same privileges as the...
    PUBLISHED: 2019-07-23
    Jeesite 1.2.7 is affected by: SQL Injection. The impact is: sensitive information disclosure. The component is: updateProcInsIdByBusinessId() function in src/main/java/com.thinkgem.jeesite/modules/act/ActDao.java has SQL Injection vulnerability. The attack vector is: network connectivity,authenticat...
    PUBLISHED: 2019-07-23
    GNUBOARD5 has XSS that allows remote attackers to inject arbitrary web script or HTML via the "Extra Contents" parameter, aka the adm/config_form_update.php cf_1~10 parameter.
    PUBLISHED: 2019-07-23
    GNUBOARD5 has XSS that allows remote attackers to inject arbitrary web script or HTML via the "board head contents" parameter, aka the adm/board_form_update.php bo_content_head parameter.