spacer spacer
spacer spacer
spacer spacer spacer
InternetWeek
TechWeb
 Advanced Search

spacer
spacer spacer
FREE Newsletter
Get the latest Internet news every day with the InternetWeek NewsBreak e-mail newsletter.
Tell me more
Sign me up
spacer
spacer spacer

Focal Points
(sponsored links)
• Migration
• Storage
• Voice &
  Data Integration


   Resources
  Home
  Features
  About InternetWeek.com
  Contact Us
  E-Mail Newsletter
  Tech Library
  TechCareers
  Privacy Statement

   Resource Centers
  Virtual Private Networks
   (VPNs)

   TechWeb Sites
  TechWeb.com
  InformationWeek
  Network Computing
  Network Magazine
  InternetWeek
  Optimize Magazine
  Security Pipeline
  Linux Pipeline
  Mobile Pipeline
  Desktop Pipeline
  Developer Pipeline
  Networking Pipeline
  Web Services Pipeline
  Enterprise Applications
   Pipeline
  Server Pipeline
  Small Business Pipeline
  IT Utility Pipeline
  Business Intelligence
   Pipeline
  Compliance Pipeline
  Financial Technology
   Network
  Wall Street & Technology
  Bank Systems &
   Technology
  Insurance & Technology
  Commweb, The Telecom
   Pipeline
  IT Pro Downloads
  Intelligent Enterprise
  Transform

 Ad Info


spacer
Updated Tuesday, August 3, 2004, 12:00 PM EDT


WLAN Attacks Getting More Sophisticated, Vendor Says
spacer
By Mobile Pipeline

spacer
Attacks on wireless LANs are getting more sophisticated and dangerous to enterprises, a company that specializes in wireless security said Tuesday.

The company, AirDefense, as attracted attention for monitoring the airwaves at popular trade shows. It said it recently monitored the DefCon12 underground hacking convention and was surprised at what it found.

"The types of attacks we are seeing are increasingly more sophisticated than those of years past," Richard Rushing, chief security officer of AirDefense, said in a statement. "Whereas last year we noted basic denial of service and MAC spoofing attacks, this year hackers have moved on to what we refer to as level three attacks, where hackers are actually injecting traffic into the network and manipulating data."

Specifically, the company noted an "injection attack" in which attendees at the conference who were surfing the Web received images and data they had not requested, a type of attack common with wired networks.

The company said it also discovered what it calls a new developer's kit denial of service attack in which the attacker modifies firmware on the network interface card. That, in turn, casues the card to send data without waiting for a signal from the access point, the company said in a statement.

"This is an example of how theoretical attacks are becoming practical," Anil Khatod, president and CEO of AirDefense, said.

The company said it chose to monitor the DefCon conference because of the nature of the attendees. In the past, AirDefense has been criticized for counting wireless security demonstrations as attacks by hackers.

spacer spacer spacer spacer
Related Links
spacer spacer spacer
- Vendors To Team On Metro Wi-Fi
spacer
spacer

spacer
spacer
Printable Version
spacer
Email the Article

spacer
spacer spacer
spacer
spacer spacer spacer
Ask Jeeves Launches Japanese-Language Search

Justice Department Launches Major Crackdown On Internet Crime

Electronic Jihad To Strike Thursday? Don't Bet On It

EU Extends Review Of Microsoft-Time Warner Deal

Big Companies Ignore Most E-Mails From Customers

Google's Real Rivals: Yahoo, MSN, And Amazon

WS-I Addresses Web Services Attachments Interoperability

Wireless Routers Enjoy Smooth Reception From Market

spacer spacer


spacer spacer
InternetWeek Marketplace (sponsored links)
Honoring Mobility at Work
QUALCOMM?s 3G cdmA-List Award Program recognizes wireless leaders and innovators. Tell us how your company is putting 3G CDMA2000 or 1x EV-DO technology to work.
Enterprise Remote Access from Fiberlink
Fiberlink's Extend360 provides more connectivity, protection and IT control - all with a lower total cost of ownership. Take the interactive tour today to experience Extend360!
Detect and Protect Your PDAs and Smartphones
This white paper will guide you step-by-step through the best practices for securing PDAs and smartphones, along with the benefits of implementing a CREDANT Technologies solution for detecting and protecting these popular productivity tools.
Secure VPN & VPN SSL Remote Access
Simple and secure remote access via VPN client and clientless VPN SSL. Complete service providing access to email, file shares, client/server applications and Intranet. Built in virus protection and firewall. No hardware needed. Learn more!
Laptop Battery
Go Electronic has a great selection of professional and consumer electronics at low prices. Including a vast selection of laptop batteries for everyday and hard to find computer models.

Buy a Link Now
spacer spacer
Home |  Breaking News |  E-Business |  Application Development
spacer
Security |  Open Source |  All Stories
spacer
spacer
Media Kit  |   Feedback

  Copyright © 2004  |  CMP Media LLC  |   Privacy Statement  |   Terms of Service