Wireless networks are vulnerable, again (WPA2 Hack)

This week we learned that after considerable effort a vulnerability has been uncovered within the popular and previously most secure method of wireless encryption – WPA2.  In classic form, the researcher will demonstrate at Defcon 18.  You may find additional (repetitive) writings here and here.

To recap WPA2 has been the recommended standard for many public industry best practice guidances, and has been the classic default in most wireless deployments.  However, this is not a “serious problem“…

Deploying wireless has been proven to be insecure since its inception, and as such best practices consistently advise that these wireless networks be deployed “as if they they were public connection”, and therefore are secured accordingly.  Specifically wireless networks are advised to be deployed on a network connection external to your corporate data network.  In this architecture the user may gain access to the public internet (with advisable filtering and automated trigger monitoring to prevent a slew of spam generation), and simply leverages their already familiar VPN connectivity software.  This provides a secure tunnel for all data transmissions and eliminates the past, present, and upcoming wireless encryption vulnerabilities.

The PCI DSS standard in fact requires compensating controls if an organization chooses to deploy wireless to enhance the existing security state where wireless is required.
Wireless is a great business enabler, but should be architected, secured, and monitored in a manner that reflects the inherent trust aspects raised with the implementation.

A nice writeup, as always, can be found at Darknet.




6 responses to “Wireless networks are vulnerable, again (WPA2 Hack)

  1. Internet security is now a major industry worldwide due to extremely high levels of risk and the number of attacks on businesses. Get help and support of experts, and conduct regular tests are all part of a regular computer security (which is to ensure security is maintained for information systems).

    Given the complexity and constantly changing risks faced by the system hangs, an expert in IT systems to ensure real security is the only effective approach. The types of services provided by IT companies security policy covering all areas of computer systems for which the testers have specific skills.

  2. Wireless security is a serious problem and, believe it or not, an invisible threat to diabetics. There’s no way to trace who committed the crime. I first learned about the hacking controversy here: http://blogs.carouselindustries.com/security/security-breach-roundup-2-banks-2-schools-and-an-insulin-pump Turns out that the companies are turning a blind eye. However, the same can’t be said for citigroup and other financial institutions even though those don’t necessary result in death.

  3. Apple has not harbingered a launching escort in India, strata and tied stickersafter removal.
    anti wrinkle cream On That Point are many mobile phone instances useable
    in unlike colors and material but Camera: its Panorama, the 40% faster photograph trancing, low-light execution, and meliorated noise decrease.

  4. http://www.cashloanssimple.co.uk/

    Some citizenry apply for the beginning loanword for bad course credit that for fillign up the
    loan applications programme kind in edict to borrow
    the pressing fund. Learn More Here You can straightaway apply and
    former lenders offer payday loans.

  5. First, Pinterest users should have more creative options to
    customize the home page. If you like something from other people’s board you can “re-pin”
    it to your own. It does mean figuring out where your target audience is engaging (social networking sites) and developing a strategy for
    how you’re going to reach them.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s