Poking Holes in Public HotSpots

Share it on Twitter  
Share it on Facebook  
Share it on Google+
Share it on Linked in  
Wireless Internet access is becoming more ubiquitous in large cities and especially at trade shows. While this is as much a license to goof off during a keynote as it is to work, you've probably assumed you're surfing on a secure wireless network, right?

Think again.

While in London for the InfoSecurity security conference recently, Kaspersky Labs senior virus analyst Alexander Gostev decided to probe the wireless public networks around the conference hall and in greater London.

What he found was the equivalent of a dentist with bad teeth. Almost two-thirds, 62 percent, of the 200 wireless access points at the conference were operating without security -- and most of them were access points in the booth of vendors selling security products.

It got a little better outside of the conference hall. Around Canary Wharf, only 40 percent of the 250 public WiFi (define) networks were operating without any encryption. Around the rest of London, Gostev found 49 percent of the public wireless access sites had no encryption whatsoever.

"It's obvious from the stats in this report people are not taking advantage of the security in these products," said Shane Coursen, senior technical consultant for Kaspersky's U.S. office. "The end lesson is: People putting up these access points need to be aware of the security built into these things and take advantage of the security in every way shape and form; and they are not."

Part of the issue comes from a lackadaisical attitude by show vendors, of all people, who may think, well, it's just a show, why secure it? But Coursen said they should be showing off their security by securing their own booth to start.

The laptops and systems behind the access points are as secure as the owner makes it, he added. If they connect through a fully unsecured access point and they're talking directly with corporate servers with no VPN (define)&npspconnection, then the traffic they transmit is going to be able to be intercepted, plain and simple.

That could mean someone gaining access to a user's laptop. Something similar happened to a Kaspersky researcher who was using a hotel's wireless access, and his Macintosh was hijacked by someone who used the unsecured hotel wireless network, said Coursen.

This article was first published on InternetNews.com. To read the full article, click here.

Submit a Comment

Loading Comments...