Posts Tagged ‘rogue access point’

Wireless IDS/IPS horror stories from the field

December 12th, 2012

These are some recent stories of the IT organizations who brought in wireless intrusion prevention systems (WIPS) to secure their network environments against Wi-Fi vulnerabilities and attacks, and what they encountered was the incessant flow of security alerts that they could not keep up with. That is because, the systems constantly crunched signatures and thresholds from wireless traffic to generate volume of alerts for the security admins to consume. Admins could not grasp the enormity of problems that they would face in the production deployments based on the product previews done in the tiny lab setups and based on the marketing material they saw (hey look, we have Gazillion attack signatures, configuration settings, and thresholds in here!). Learn from their experiences, and avoid the destiny they faced by asking the right questions and making the right technology choices early on. AirTight Networks to date has helped thousands of customers avoid such misery by helping them with the strongest WIPS protection without the overhead of ongoing system management. Read more…

Wireless security , , , , , , , , , , , , ,

CNN – Security experts warn of dangers of rogue Wi-Fi hotspots

August 11th, 2009

Security experts warn of dangers of rogue Wi-Fi hotspots

Story Highlights from CNN International

  • Security experts warn Wi-Fi users to be more vigilant against hackers
  • Experts say it’s difficult to distinguish between legitimate and rogue networks
  • Wi-Fi Alliance says spread of Wi-Fi hasn’t led to an ‘epidemic’ of hacking
  • Users urged to protect their networks, use VPN for sensitive data

LONDON, England (CNN) — You’re sitting in an airport lounge and seize the chance to check your e-mails before your flight departs. You log on and are tempted by a wireless Internet provider offering free Internet access. So, do you take it?

Security experts warn that hackers may be masquerading as free public Wi-Fi providers to gain access to the laptops of unsuspecting travelers. Read more…

Wireless security , ,