While in London for the InfoSecurity security conference recently, Kaspersky Labs senior virus analyst Alexander Gostev decided to probe the wireless public networks around the conference hall and in greater London.
What he found was the equivalent of a dentist with bad teeth. Almost two-thirds, 62 percent, of the 200 wireless access points at the conference were operating without security -- and most of them were access points in the booth of vendors selling security products.
"It's obvious from the stats in this report people are not taking advantage of the security in these products," said Shane Coursen, senior technical consultant for Kaspersky's U.S. office. "The end lesson is: People putting up these access points need to be aware of the security built into these things and take advantage of the security in every way shape and form; and they are not."
Part of the issue comes from a lackadaisical attitude by show vendors, of all people, who may think, well, it's just a show, why secure it? But Coursen said they should be showing off their security by securing their own booth to start.
The laptops and systems behind the access points are as secure as the owner makes it, he added. If they connect through a fully unsecured access point and they're talking directly with corporate servers with no VPN (define)&npspconnection, then the traffic they transmit is going to be able to be intercepted, plain and simple.
That could mean someone gaining access to a user's laptop. Something similar happened to a Kaspersky researcher who was using a hotel's wireless access, and his Macintosh was hijacked by someone who used the unsecured hotel wireless network, said Coursen.