Access member only content, take part in discussions with comments on blogs, news and reviews and receive all the latest security industry news directly to your inbox. Join now for free.
Processing registration... Please wait.
This process can take up to a minute to complete.
A confirmation email has been sent to your email address - SUPPLIED EMAIL HERE. Please click on the link in the email to verify your email address. You need to verify your email before you can start posting.
If you do not receive your confirmation email within the next few minutes, it may be because the email has been captured by a junk mail filter. Please ensure you add the domain @scmagazine.com.au to your white-listed senders.
The conclusions of the study are clear: Security on WiFi networks is insufficient, said Panda. While the most widely used protocol for the security of the network, Wired Equivalent Privacy, has many vulnerabilities, the most effective protocols, such as WiFi Protected Access or WPA-PSK, are hardly used at all, the report reveals.
PandaLabs was able to verify this through a series of war driving surveys carried out internationally. Sixty percent of networks lacked protection, according to the results.
"This survey highlights security levels in wireless networks, examining security methods and how their design limitations, or even incorrect configurations, can make them vulnerable," said Luis Corrons, director of PandaLabs. "This will enable users to avoid the dangers that lie in waiting if the correct measures are not taken while deploying a WiFi network.
"Although wireless networks have not been exploited extensively for malicious ends, it would seem clear that users are not sufficiently aware of the threat this poses to security. This is a highly sensitive issue for companies - if corporate networks using WiFi are not correctly protected, the scope of the potential attack is increasingly dangerous, as security could be compromised across the company because the WiFi networks represent an entry point for malware and targeted attacks," Corrons added.
To begin commenting right away, you can log in below or register an account if you don't yet have one. Please read our guidelines on commenting. Offending posts will be removed and your access may be suspended. Abusive or obscene language will not be tolerated. The comments below do not necessarily reflect the views or opinions of SC Magazine, Haymarket Media or its employees.