Recording Some Unwanted Conference Traffic - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
Business & Finance
News
3/4/2003
02:07 PM
50%
50%

Recording Some Unwanted Conference Traffic

A network security firm witnessed poor wireless practices at N+I, including denial-of-service attacks.

Trade shows are a great place for vendors to display their wares to the world and invite closer inspection of their technology. But at the NetWorld+Interop conference last week in Las Vegas, one wireless vendor found the other attendees exposing more than their new products.

Jay Chaudhry, CEO of AirDefense Inc., fired up his company's wireless LAN security appliance and scanned the air for open networks. What he found was a mess of openly exposed traffic, unsecured devices, and even some malicious behavior. "We were surprised when we started seeing a lot of open traffic out there," he says. "You could see everything, from passwords to E-mails."

Some of his findings: Among the 230 access points identified on the showroom floor, 92 didn't use encryption; 38 were configured with default settings; and 15 were directly connected into hubs, which caused them to broadcast all wired traffic into the air. Of the 824 devices using those access points, 72 of them were broadcasting probes looking for corporate networks that weren't there. Capturing that information could help an intruder break into the wireless LAN back at a company's headquarters. Chaudhry even observed 16 denial-of-service attacks and 10 identity thefts.

It's likely that many of the unsecured wireless networks identified didn't need to be secure, since they were part of demo systems and didn't have anything of value. But Chaudhry says he's still surprised by the lax behavior. "Everyone is pretty conscious about security these days," he says. "You would think that you would want to demonstrate your best practices."

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
State of the Cloud
State of the Cloud
Cloud has drastically changed how IT organizations consume and deploy services in the digital age. This research report will delve into public, private and hybrid cloud adoption trends, with a special focus on infrastructure as a service and its role in the enterprise. Find out the challenges organizations are experiencing, and the technologies and strategies they are using to manage and mitigate those challenges today.
Commentary
Enterprise Guide to Digital Transformation
Cathleen Gagne, Managing Editor, InformationWeek,  8/13/2019
Slideshows
IT Careers: How to Get a Job as a Site Reliability Engineer
Cynthia Harvey, Freelance Journalist, InformationWeek,  7/31/2019
Commentary
AI Ethics Guidelines Every CIO Should Read
Guest Commentary, Guest Commentary,  8/7/2019
Register for InformationWeek Newsletters
Video
Current Issue
Data Science and AI in the Fast Lane
This IT Trend Report will help you gain insight into how quickly and dramatically data science is influencing how enterprises are managed and where they will derive business success. Read the report today!
White Papers
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Sponsored Video
Flash Poll