3.1 C
London
Sunday, November 19, 2017
Home Tags Wireless access points

Tag: wireless access points

The very nature of wireless Wi-Fi networks means that hackers or criminals simply need to be located near an access point in order to eavesdrop and intercept network traffic. Poorly configured access point encryption or services that allow data to be sent without any encryption pose a serious threat to user data. Confidential data can be protected by encrypting traffic at wireless access points.
In fact, this method of protection is now considered essential for all Wi-Fi networks.

But what actually happens in practice? Is traffic always encrypted on public Wi-Fi networks? How does the situation differ from country to country? Kaspersky Security Network statistics can answer all these questions. We compared the situation with Wi-Fi traffic encryption in different countries using data from our threat database. We counted the number of reliable and unreliable networks in each country that has more than 10 thousand access points known to us (this obviously excludes Antarctica and other regions where there is not enough data to draw any conclusions). Security of Wireless Networks Using statistics from Kaspersky Security Network (KSN), we analyzed data from across the world for almost 32 million Wi-Fi hotspots accessed by the wireless adapters of KSN users. Encryption type used in public Wi-Fi hotspots across the world Approximately 24.7% of Wi-Fi hotspots in the world do not use any encryption at all.

This basically means that by using an antenna capable of sending and receiving data at 2.4 GHz, any individual located near an access point can easily intercept and store all user traffic and then browse it for data they are interested in.

Fortunately, modern online banking systems and messengers do not transfer unencrypted data.

But this is the only thing that prevents users of Wi-Fi networks with unencrypted traffic from revealing their passwords and other essential data when using an unsecure access point. The WEP (Wired Equivalent Privacy) protocol for encryption of data transferred over Wi-Fi is used by approximately 3.1% of all analyzed access points.

The protocol was the first to be created, quite a long time ago, and is now completely unreliable – it would take hackers just a few minutes to crack it.

From a data security point of view, using WEP is not much different from using open networks.

This protocol is being relegated to oblivion everywhere, but as we see from the chart above, it can still be found in use. Around three-quarters of all access points use encryption based on the Wi-Fi Protected Access (WPA) protocol family.

The protocols from this family are currently the most secure.

The effort required to hack WPA depends on its settings, including the complexity of the password set by the hotspot owner.
It is worth noting that an attempt to decipher traffic from “personal” (WPA-Personal, PSK authentication) wireless networks (with public access points) can be made by intercepting the handshakes between the access point and the device at the beginning of the session. “Corporate” versions are protected from this sort of interception because they use internal company authorization. When it comes to “personal” WPA2 attacks, the situation is similar to that of WPA and mostly depends on the strength of the password set by the hotspot owner. It is only fair to note that during a standard attack on a Wi-Fi access point, a personal computer can generate from 50 to 300 keys per second on average.
If the encryption key is strong, it will take years to hack it.
Still, no one can guarantee that the key used at a cafe will be secure and that the attacker will have nothing but a PC at their disposal. Overall, it can be said that today’s WPA/WPA2 “non-enterprise” versions are reasonably, but not absolutely, secure.
In particular, they allow brute-force and dictionary attacks.

There are ready-to-use publicly available tools (aircrack-ng and similar software) for performing such attacks, as well as a large number of manuals. Geography of Unsecured Wi-Fi Access Points Share of Wi-Fi hotspots that use unreliable WEP or do not encrypt data (by country) We would like to note that the five countries with the highest proportion of unsecured connections include Korea (47.9% of unsecured Wi-Fi access points), while France (40.14%) and the US (39.31%) rate 9th and 12th respectively in the list. Germany appears to be the most secure among Western European countries, with 84.91% of access points secured by WPA/WPA2 protocol encryption. Share of Wi-Fi hotspots that use WPA/WPA2 (by country) However, even when using an encrypted connection, you should not completely rely upon this security measure.

There are several scenarios that could compromise even well-encrypted network traffic.

These include fake access points with names that duplicate or mimic real ones (for example, TrainStation_Free or TrainStation Free) and compromised routers forwarding traffic without encryption to attackers (malware tools that infect such devices are already “in the wild”).

At any rate, taking care of your own security is a good idea. Recommendations for Users There are several simple rules that help protect personal data when using open Wi-Fi networks in cafes, hotels, airports, and other public places. Do not trust networks that are not password-protected. Even if a network requests a password, you should remain vigilant. Fraudsters can find out the network password at a coffee shop, for example, and then create a fake connection with the same password.

This allows them to easily steal personal user data. You should only trust network names and passwords given to you by employees of the establishment. To maximize your protection, turn off your Wi-Fi connection whenever you are not using it.

This will also save your battery life. We recommend disabling automatic connection to existing Wi-Fi networks too. If you are not 100% sure the wireless network you are using is secure, but you still need to connect to the internet, try to limit yourself to basic user actions such as searching for information. You should refrain from entering your login details for social networks or mail services, and definitely not perform any online banking operations or enter your bank card details anywhere. To avoid being a target for cybercriminals, you should enable the “Always use a secure connection” (HTTPS) option in your device settings.
It is recommended to enable this option when visiting any websites you think may lack the necessary protection. If possible, connect via a Virtual Private Network (VPN). With a VPN, encrypted traffic is transmitted over a protected tunnel, meaning criminals won’t be able to read your data, even if they gain access to them. And, of course, you should use dedicated security solutions.

They inform users about any potential dangers when connecting to a suspicious Wi-Fi network and prevent any passwords or other confidential data from being compromised if there is a threat. One example of a dedicated solution is the Secure Connection tool included in the latest versions of Kaspersky Internet Security and Kaspersky Total Security.

This module protects users connected to Wi-Fi networks by providing a secure encrypted connection channel.
Secure Connection can be launched manually or, depending on the settings, activated automatically when connecting to public Wi-Fi networks, when navigating to online banking and payment systems or online stores, and when communicating online (mail services, social networks, etc.).
Product Cisco Bug ID Fixed Release Availability Cisco SocialMiner CSCvc32449 11.6.1 (15-Jun-2017) Cisco Unified MeetingPlace CSCvc23583 Cisco WebEx Node for MCS CSCvc23453 Cisco Jabber Guest CSCvc23580 11.0.1 (28-Feb-2017) Cisco Application and Co...
Latest product updates empower organisations to discover, provide insight and take action based on increased visibility in their environmentsLondon – October 18, 2016 – LANDESK today announced its 2016.3 product releases, bringing new visibility and discovery capabilities to the LANDESK solutions portfolio. With the latest updates, LANDESK gives organisations an improved view of what’s in their environment and the ability to take action within the same system. There is a growing need for IT to better understand what’s happening in the environment and have the tools to take action when needed. Without this level of visibility, organisations face higher risks of failed audits, security threats, inconsistent policies and support for devices, and lacklustre IT and business services. Visibility issues manifest in different ways and affect multiple IT business practices.

For example, if the asset team doesn’t know what software they have and where it is being used, the organisation is at risk for failed audits or for over-buying of software licenses.
If the security team doesn’t have enhanced discovery capabilities, they may fail to identify nefarious devices trying to connect to the network. When it comes to managing traditional, mobile, and VDI endpoints, an extensive inventory allows IT to correctly configure and manage each device type and version.

Finally, improved visibility helps service desk staff to quickly identify what may have changed on devices experiencing difficulties, and helps organisations understand the impact of changes to help them deliver top quality IT and business services. With such high stakes, organisations have taken steps to increase visibility, but without an integrated solution, it’s not enough.

A recent Enterprise Management Associates report, Optimising IT for Financial Performance, found the average organisation has more than 11 discovery tools.

The problem is, these tools don’t provide visibility across all IT security and management activities, and don’t enable IT to take immediate action on the results. “At LANDESK, we think there’s a better way, and we’ve added new capabilities across the entire solutions portfolio to improve access and visibility, giving our customers the tools to take action like never before,” said Duane Newman, VP of product management at LANDESK. “The latest 2016.3 releases give IT speed of remediation, delivering positive business outcomes to their consumers.” LANDESK’s updated solutions portfolio caters to a variety of visibility-related scenarios, with invisible or short-lived assets serving as a prime example.

Because of what virtualisation allows, assets will sometimes appear on the network, live their entire life and come down between discovery scans. However, their disappearance doesn’t exonerate an organisation from paying licensing fees, nor does it protect from security issues or breaches, should the item be nefarious. To solve for this, LANDESK has enhanced its passive discovery mechanisms, updating its Neighbourhood Watch technology, which leverages other known devices to quickly identify and report new, unknown items as they appear on the network. With the 2016.3 release, it gives IT the option to automatically instigate a full inventory of each discovered asset, down to hardware, firmware and what software is on the device, enabling IT to gather key data required for managing end user devices, securing data and tracking assets. In the 2016.3 release, LANDESK is helping to improve overall IT visibility into organisations’ environments in the following ways: LANDESK IT Asset Management: With agentless scanning for invisible assets and a new dashboard search gadget in the latest LANDESK IT Asset Management Suite release, IT can now discover new assets and search for them faster. LANDESK Security Suite: Security Suite 2016.3 brings additional visibility with improved insights into applications running on all discovered endpoints, as well as the ability to take action on suspicious and malicious apps from within the same interface.

Because the data is also integrated with Management Suite, organisations have visibility across IT security and management activities to reduce risk and improve decision-making. Unified Endpoint Management: The updates to LANDESK UEM provide deeper agentless discovery, and enable discovery through distributed wireless access points (managed devices on the network as part of the “Neighbourhood Watch”), Android for Work, and extended Windows 10 support, plus common licensing, enrolment, and MDM across Apple Mac and iOS devices. LANDESK Service Desk: Service Desk 2016.3 delivers visibility faster, with dashboard knowledge search, impact analysis in the Workspace interface and query filters for record location. Plus, discover the Kbot Design app from the Design App Store. Xtraction: The 2016.3 update to Xtraction offers IT an improved user experience and connectors updates for LANDESK Management Suite, Service Desk, Wavelink Avalanche 5.3, and SCCM. For more information about enhancements in the 2016.3 versions of these products, see: LANDESK Management Suite 2016.3, LANDESK Security Suite 2016.3, LANDESK IT Asset Management Suite 2016.3, and LANDESK Service Desk 2016.3. About LANDESK:LANDESK is the global authority on user-cantered IT.

By integrating and automating IT tasks, LANDESK helps organisations balance rapidly evolving user requirements with the need to secure critical assets and data. LANDESK is headquartered in Salt Lake City, UT, and has offices all over the world.

To learn more, visit www.landesk.com.Copyright © 2016, LANDESK.

All rights reserved.
Media Contacts:Sarah LewisLANDESK01344 442164sarah.lewis@landesk.com Tanya PennellsOctopus Group020 3837 3686landesk@weareoctopusgroup.net
New WatchGuard T70 Network Security Appliance Delivers Over 1 Gbps UTM Throughput4 October 2016 – WatchGuard® Technologies, has announced its new Firebox T70 hardware appliance, which sets a new standard for tabletop UTM performance.

According to Miercom, an independent testing lab, the T70 delivers the fastest throughput available in the industry today, with speeds over 1 Gbps when operating in full Unified Threat Management (UTM) mode.

This means that customers don’t have to compromise between network bandwidth and leveraging the UTM security services to protect their networks. WatchGuard T70 Miercom found that the T70 achieves over 1 Gbps throughput in full UTM mode, which is 52 percent higher than the average competitor appliance tested and 38 percent higher than the next competitor.
So, even with today’s environment of heavy HTTPS traffic, network users and administrators will always get the full benefit of all WatchGuard security services. KEY FEATURES:Performance: Customers benefit from the highest speeds and performance levels available in a tabletop security appliance, with over 1 Gbps throughput with full UTM protection enabled. Power over Ethernet (PoE): Using the two PoE+ ports to power peripheral devices, such as wireless access points, network administrators can extend the reach of their networks without having to run costly AC power to remote devices. RapidDeploy: Centralised IT teams can use RapidDeploy to pre-configure appliances for quick and non-technical installations at distributed locations. Full UTM Protection for Fibre Broadband: Organisations can benefit from fibre broadband services, such as Google Fiber, knowing the T70 can easily manage these expanding speeds. SUPPORTING QUOTES:Andrew Evers, Group IT Manager at Red Carnation Hotels: “The T70 provides the highest levels of performance and capability I’ve seen in such a small unit.
I can now deploy the same enterprise-grade security services across our entire organisation, whether in a small office, or at larger sites.

The T70 delivers a small footprint, allowing for a good amount of diversification and growth, before needing to trade-up. Ultimately, this solution represents a valued addition to the WatchGuard family because it hardens security, enables automation for my team and creates greater flexibility and enablement for my users.” Dave Ashton, Sales Director at Sec-1: “The T70 is a great addition to the WatchGuard range and has been universally welcomed by the WatchGuard channel.
It offers unmatched price / performance for our SME customers who want enterprise level security and performance at affordable prices.” Rob Smithers, CEO, Miercom: "Overall, the WatchGuard Firebox T70 exhibited the best overall throughput performance of the competitive security appliances tested.
In addition, while competitors' performance was greatly reduced as more security functions and features were enabled, the WatchGuard Firebox T70's continued to prove exceptional performance.” Andrew Young, Vice President of Product Management at WatchGuard Technologies: “Organisations today require fast, reliable and secure internet connectivity, but are struggling to find network security solutions that can keep up with their ever-growing needs.

This challenge is further exacerbated by the growing availability of fibre broadband around the world.

The WatchGuard T70 is ideal for small and midsize businesses or distributed enterprises that need the highest performance available in a tabletop security appliance.

The blazing fast performance of the T70 will make network slowdown concerns a thing of the past.” ADDITIONAL RESOURCES: WatchGuard will be showcasing the Firebox T70 at this week’s IP Expo Europe. About WatchGuard TechnologiesWatchGuard® Technologies, Inc. is a global leader in network security, providing best-in-class Unified Threat Management, Next Generation Firewall, secure Wi-Fi, and network intelligence products and services to more than 75,000 customers worldwide.

The company’s mission is to make enterprise-grade security accessible to companies of all types and sizes through simplicity, making WatchGuard an ideal solution for Distributed Enterprises and SMBs. WatchGuard is headquartered in Seattle, Washington, with offices throughout North America, Europe, Asia Pacific, and Latin America.

To learn more, visit WatchGuard.com. For additional information, promotions and updates, follow WatchGuard on Twitter, @WatchGuard on Facebook, or on the LinkedIn Company page.

Also, visit our InfoSec blog, Secplicity, for real-time information about the latest threats and how to cope with them at www.secplicity.org. Contacts:Rowena Case, WatchGuard Technologies0203 608 9070, ukmarketing@watchguard.com Peter Rennison, PRPR01442 245030, pr@prpr.co.uk