|
Hot-Spot Hazards
October 14, 2003
By Leon Erlanger
Hot spots are hot. Located in thousands of airport lounges, hotels, cafés, and even public parks, they allow anyone with an 802.11b wireless LAN card to surf the Web, check e-mail, or even connect to the company LAN at broadband speeds.
Before you experience the thrill of surfing the Net while nursing a latte at Starbucks, however, be sure you take the necessary precautions.
All wireless LANs have security issues, but wireless hot spots raise unique concerns. As with any wireless LAN, signals can penetrate walls and ceilings. That means that anyone in range with a standard wireless card can connect, even if they're sitting out in the parking lot.
Hot-spot services are designed for maximum ease of use, so they generally don't offer WEP or WPA encryption; if you connect to a hot spot, just about all the data you send is probably unencrypted. Since wireless LANs allow peer-to-peer connections, the computer-savvy guy at the corner table may be able to connect to your notebook and mooch your Internet connection, look at your unprotected files, or hitch a ride as you connect to your corporate LAN. He can also eavesdrop the airwaves with one of the many wireless sniffers available on the Web and watch as you unintentionally reveal your corporate network log-on information, your credit card numbers, IP addresses of your connections, and even the contents of e-mails, instant messages, and file attachments. Anyone with malicious intent can do lots of damage with this information, both to you and the company that employs you. And of course, you're vulnerable to the same viruses, worms, and other attacks as you would be on any unprotected network.
So what can you do? Here are several ways you can protect yourself.
• Disable your wireless card's ad-hoc (peer-to-peer) mode. You can do this via the adapter's utilities or within Windows XP by clicking on Network Connections in the Control Panel. This will help prevent anyone from connecting to your notebook.
• Remove or disable your wireless card if you're working offline.
• Install a personal firewall. Windows XP offers the rudimentary Internet Connections Firewall, but more advanced personal firewall products, such as Symantec's Norton Internet Security and Zone Labs' ZoneAlarm, can prevent others from accessing your notebook and even alert you when an attempt is made.
• Install personal antivirus software from McAfee, Symantec, or another antivirus vendor, and enable automatic signature updates.
• Take advantage of your e-mail client's security features, particularly digital signatures and e-mail encryption. Digital signatures verify your identity to your recipients and ensure that messages are not tampered with during transmission. Microsoft Outlook lets you add digital signatures to messages and encrypt messages and attachments using S/MIME. If you're using a Web-based e-mail service, make sure it offers some type of encryption. Be aware, however, that in many cases with such services only the log-on information is encrypted, while text is sent in the clear. You may want to use third-party e-mail encryption utilities, such as PGP Corp.'s PGP Personal, which offers digital signatures and strong encryption for messages and attachments, as well as for files stored on your computer.
• Make sure you submit credit card information only to SSL-protected Web sites (look for https:// in the address bar).
• For the best protection, use a virtual private network (VPN) to provide strong authentication and encryption for all your hot-spot communications. This is particularly important if you're connecting to your company's network, in which case you'll probably get VPN client software from your IT manager. Small-business users can install VPN-enabled firewall and router appliances from Netgear, SonicWall, 3Com, or Watchguard at the office or use one of the many small-business VPN services available, for example, from Sprint or Verio. Individual users can take advantage of inexpensive consumer VPN services such as HotSpotVPN (www.hotspotvpn.com). Or they can limit themselves to protected hot spots, such as those from EarthLink and others that make up the Boingo Wireless network.
• Keep your OS and software up to date with security patches.
And of course, make sure nobody is looking over your shoulder as you enter vital information. Enjoy the freedom and convenience that hot spots offer, but make sure that hot spots don't land you in hot water.
PCMag
Copyright (c) 2003 Ziff Davis Media Inc. All Rights Reserved.
|
|
|
|
Posted on Thursday, 25 September 2003 @ 05:35:00 EDT by phoenix22
|
|
|
|
|
Login |
|
|
|
|
|
· New User? ·
Click here to create a registered account.
|
|
|
Article Rating |
|
|
|
|
|
Average Score: 5
Votes: 1
|
|
|