New User? Need help? Click here to register for free! Registering removes the advertisements.

Computer Cops
image image image image image image image image
Donations
If you found this site helpful, please donate to help keep it online
Don't want to use PayPal? Try our physical address
image
Prime Choice
· Head Lines
· Advisories (All)
· Dnld of the Week!
· CCSP News Ltrs
· Find a Cure!

· Ian T's (AR 23)
· Marcia's (CO8)
· Bill G's (CO11)
· Paul's (AR 5)
· Robin's (AR 2)

· Ian T's Archive
· Marcia's Archive
· Bill G's Archive
· Paul's Archive
· Robin's Archive
image
Security Central
· Home
· Wireless
· Bookmarks
· CLSID
· Columbia
· Community
· Downloads
· Encyclopedia
· Feedback (send)
· Forums
· Gallery
· Giveaways
· HijackThis
· Journal
· Members List
· My Downloads
· PremChat
· Premium
· Private Messages
· Proxomitron
· Quizz
· RegChat
· Reviews
· Google Search
· Sections
· Software
· Statistics
· Stories Archive
· Submit News
· Surveys
· Top
· Topics
· Web Links
· Your Account
image
CCSP Toolkit
· Email Virus Scan
· UDP Port Scanner
· TCP Port Scanner
· Trojan TCP Scan
· Reveal Your IP
· Algorithms
· Whois
· nmap port scanner
· IPs Banned [?]
image
Survey
How much can you give to keep Computer Cops online?

$10 up to $25 per year?
$25 up to $50 per year?
$10 up to $25 per month?
$25 up to $50 per month?
More than $50 per year?
More than $50 per month?
One time only?
Other (please comment)



Results
Polls

Votes: 983
Comments: 19
image
Translate
English German French
Italian Portuguese Spanish
Chinese Greek Russian
image
image wireless: Security Tips/Tools: 'Drive-By Hackers' Target Wireless Computer Networks image
Wireless
'Drive-By Hackers' Target Wireless Computer Networks
Home, Office Systems Are Vulnerable

SAN DIEGO -- Do you have wireless Internet? If you do, you've also got a potential security problem on your hands.

Hackers can intercept your signals while going past your home, your office and anywhere else you can take a laptop, or a hand-held computer. What they can do with those signals could ruin your life and many others.

There are millions of hackers who can break into a wireless computer or even a Palm Pilot or Blackberry. They are called drive-by hackers, and they gain access by picking up the wireless broadcasts from some distance away.

They like to get in their cars and go war driving, as they call it. Most don't misuse the data they find, but there are plenty of hackers out there who could do incredible harm.

To see how it is done, television station KNSD sent a reporter war driving with San Diego computer security consultant George Spillman.

I'm going to start scanning here as we're driving down the road, and it's going to start naming off the (access points) as we pick them up, Spillman said.

After 15 minutes of war driving past shopping centers, apartment complexes and suburban neighborhood, Spillman logged hundreds of access points, or APs, for wireless networks. Too many are open doors for signal-stealing hackers who can learn your passwords, read your e-mail, use your credit card numbers and turn your home computer system into a weapon, the station reported.

They could be loading spam. They could be loading viruses on the Internet, Spillman said. You could have child pornographers using your system. You could have terrorists driving by your house, using your system to send a message. And the only traceable route back to it is you. It stops at your house.

Hackers don't need exotic equipment to do this. All they need is a laptop computer with a consumer wireless card.

We took this one apart and soldered in an external connection so we can use it with a secondary antenna, Spillman said.

Serious hackers use equipment to enhance the signals. And they can get all the technology they need right off the shelf at your local mall.

Many of the wireless networks being sold to consumers offer security measures to keep hackers out. But the hackers look for countermeasures, and the good ones find them.

Experts say you can make your system harder to hijack by taking basic precautions with your wireless network:
Encrypt
Change passwords frequently
When you're gone or asleep, shut everything down

If you don't feel like that is enough, a company called Downtown IT will go to your home or business and secure your system for you. Get more information at the company's Web site.

thekansascitychannel
Posted on Wednesday, 05 November 2003 @ 04:50:00 EST by phoenix22
image

 
Login
Nickname

Password

· New User? ·
Click here to create a registered account.
image
Related Links
· TrackBack (0)
· Palm Pilot
· SuSE
· HotScripts
· W3 Consortium
· Spam Cop
· More about Wireless
· News by phoenix22


Most read story about Wireless:
First Ever GSM Cellphone Exploit

image
Article Rating
Average Score: 4
Votes: 1


Please take a second and vote for this article:

Bad
Regular
Good
Very Good
Excellent


image
Options

Printer Friendly Page  Printer Friendly Page

image
"Login" | Login/Create an Account | 0 comments
Threshold
The comments are owned by the poster. We aren't responsible for their content.

No Comments Allowed for Anonymous, please register