FBI demonstrates 3 minute Wi-Fi hack

FBI demonstrates 3 minute Wi-Fi hack

Summary: For those of you who have been reading my blogs on a routine bases, it would come as no surprise to you that the FBI demonstrated the hacking of a wireless LAN in 3 minutes.? It was only last month that I blogged about how you can hack most wireless LANs in minutes with the very same techniques.?

SHARE:
TOPICS: Government US
1

For those of you who have been reading my blogs on a routine bases, it would come as no surprise to you that the FBI demonstrated the hacking of a wireless LAN in 3 minutes.? It was only last month that I blogged about how you can hack most wireless LANs in minutes with the very same techniques.? It's ironic that the FBI is not using some fancy top secret multi-million dollar device to snoop in on your wireless LAN but instead is using off-the-shelf hacking tools that are freely available on the Internet.

The lesson here is that it doesn't take some super hacker to break in to your home or business network, anyone can.? At the end of the linked article, the FBI gives some decent advice that is pretty much in line with the best practices for homes that I've also outlined.? I probably would have not talked about "network segregation" since that's well beyond the means of most small businesses and homes, but I would definitely recommend following their other recommendations.

Topic: Government US

Kick off your day with ZDNet's daily email newsletter. It's the freshest tech news and opinion, served hot. Get it.

Talkback

1 comment
Log in or register to join the discussion
  • WEP vs WPA

    The weakness in wireless networks discussed in the article concerns the WEP protocol. It is common knowledge that WEP, even if implemented "correctly", is quite weak. WPA is a much improved encryption standard, as the article make clear in the conclusions.

    It is unfortunate that many WiFi products are still being sold with only WEP capabilities. Caveat emptor! When buying wireless equipment, make sure to read the documentation first (usualy available online), and make sure the intended deployment will allow WPA. For example, the Linksys WAP54G is an access point that supports WAP. However, if two are used for a wireless bridge, only WEP is supported. The bridging feature is promoted as a selling point, and in the end many users have no choice other than to dumb down their security (or send the WAP54Gs back).
    RestonTechAlec