SolutionOne Blog

SolutionOne has been serving the North Texas area since 2004, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Hairballs and WiFi Data are What the Cat Dragged In

b2ap3_thumbnail_warkitteh_on_the_loose_400.jpgFor Washington D.C. residents, there's a dubious threat looming in their backyards putting their personal data at risk. It's Coco, a Siamese cat wearing a high-tech collar designed for hacking WiFi networks. Have you taken the proper security measures to protect your sensitive information from feline foes like Coco?

Actually, this cat isn't a real danger to anybody. In fact, you're more at risk of getting fleas from the neighborhood strays than you are of getting hacked by them ...or at least that's what the cats want us to think. In the case of Coco, this wasn't an act of sabotage (or catotage) from the feline uprising, but rather, it's an experiment in network security by Gene Bransfield, an experiment Gene humorously calls "WarKitteh."

The collar worn by Coco was outfitted with firmware, a WiFi card, an SD memory card, and a GPS module. Coco was then allowed to roam the neighborhood and he encountered a variety of different WiFi networks. Upon Coco's return, Gene was provided with data containing the names and locations of area WiFi networks, along with the networks' security settings--plus a dead bird.

The threat posed by having poor WiFi security is very real. WarKitteh can obtain important information, like whether a network is using WPA encryption or WEP keys for its security settings. WEP is an older form of WiFi security that an amateur hacker can access, and much to Gene's surprise, WarKitteh yielded him with the names and locations of several WiFi networks in his neighborhood using the outdated WEP security. Equally surprising was the fact that one-third of the WiFi networks from the WarKitteh used WEP.

While it's not likely that Coco will be showing up in your backyard, there's a good chance that a hacker could pull off the same feat. In fact, it's a common practice for hackers to harvest WiFi network information by simply driving past homes in vehicles equipped with the same data collection technology.

After the data is crunched, hackers can then breach WiFi networks by bypassing WEP security, and then use the IP addresses and for nefarious purposes. In fact, there are several stories where this happens and SWAT teams follow the connection to a hacked household, storm the perimeter, and subdue the residents, only to later discover that the innocent party had their WiFi hacked. This is exactly how the cats plan on turning us against each other.

Having strong WiFi security for your business is important. A hacker that can penetrate your network via WiFi can do a lot of damage. SolutionOne can protect your business by assessing the security of your company's network, and equipping you with an enterprise-level security solution that not even the cleverest cat can hack. Call us today at (214) 299-8555 to cat-proof your company's network!

Hackers Lay Claim to 4½ Million Medical Records
3 Results Businesses are Demanding from Their Outs...
 

Comments

No comments made yet. Be the first to submit a comment
Guest
Already Registered? Login Here
Guest
Tuesday, December 24 2024

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Blog Archive