Keeping your wireless connection
safe should be a top priority, especially if you use your wireless
laptop or cell phone to login to secure financial accounts or business
email. We all use the internet to access personal information, do
banking, and chat in private to friends. Image if someone was watching
you, browsing through your files, or recording your every move on your
computer? Well don’t just sit there and think that it will not happen to
you! If you have a wireless connection then you should make sure it is safe and secure by adding at least one simple security measure. Wireless network security is very important when it comes to protecting your privacy and precious data.
The Risks of a Weak Wireless Connection
Last year, the Washington Post report on a series of Facebook scams. Hackers would break into people’s Facebook accounts, claim to have been robbed in a foreign country, and ask their Facebook friends for someone to wire them money. Could this fool your family and friends into handing over hundreds or thousands of dollars?One thing that makes this possible is that hackers can access your Facebook account, no matter how strong your password, if they can snoop on your wireless connection. They don’t need special equipment to do this—any basic wireless card lets hackers snoop on wireless connections using free software.
There are three ways to protect yourself from wireless connection hackers:
- Don’t use a wireless connection. Always plug your computer into a blue Ethernet cord.
- Only use a wireless connection at least 1/2 mile (about 1 kilometer) away from any hackers.
- Secure your wireless connection from the five types of threats described in this article.
Wireless Connection Threat #1: Unencrypted Connections
Unencrypted connections are great—they’re easy to set up on your wireless router and all of your devices connect automatically. But because they’re unencrypted, hackers can eavesdrop on all of your wireless traffic. Well, almost all of your wireless traffic—anything that uses Secure Socket Layer (SSL) encryption like websites starting with HTTPS will be encrypted.Unfortunately, although Facebook and GMail and other sites use SSL for login screens, they don’t use it for their regular connections. In these cases, hackers can still break into your accounts by reading the cookie your Web browser sends to Facebook and Google every time you connect.
If you own the wireless connection, your best solution is to enable encryption on your router. Choose WPA encryption if possible, but on older routers you’ll need to settle for WEP. See the next section for information on the risks of WEP.
If you don’t own the wireless connection, for example you’re at a library or coffee shop, then you need to protect your connection by using a Virtual Private Network (VPN) or by using one of the plugins for your browser which force Facebook, GMail, and other services to use SSL.
Wireless Connection Threat #2: WEP
The Wired Equivilance Privacy (WEP) system was part of the original specification for wireless Internet, but within a few years of being released, hackers figured out how to break it. In 2007, three cryptoanalysts broke into a WEP connection using a 1.7 GHz laptop in less than 1 minute. They published their technique and now any hacker can use it to eavesdrop on any WEP-protected connection.WEP has been officially replaced by Wifi Protected Access (WPA), but many old routers only support WEP. If you have an option to use WPA, please use it. If you don’t have support for WEP on your router and you’re concerned about security, you should see if the manufacturer of your router offers a firmware upgrade. Otherwise you should buy a newer router.
Wireless Connection Threat #3: Weak Passwords
WPA lets you secure your wireless connection using a password, but this password can be hacked like any other weak password. Because this password helps keep all of your other passwords secure, you should put some extra thought into making it very secure. Besides, you’ll only have to type it once on each computer, so it won’t be much of a hassle to make it extra hard to guess.I suggest you add a few numbers and some punctuation to your password to help keep hackers from guessing it. Also make sure it’s at least 8 characters long—and preferably 12 characters or more.
Wireless Connection Threat #4: Snooping Users
No matter how secure you make your wireless network using WPA and strong passwords, you still must trust every user you let onto your network. Once users have access to your network, they can snoop on every packet sent on your wireless connection.For example, if you’re at a hotel which uses WPA and you log into Facebook, any hacker who’s in a nearby room can also use his WPA-protected connection to snoop on your packets. At an office, employees can snoop on the boss’s WPA connection to get access to confidential information.
High-end routers can give each user their own secure connection, or you can just buy separate cheap routers for each class of user—for example, one router for managers and one router for employees.
Wireless Connection Threat #5: Traffic Analysis
One of the most advanced hacker techniques which is probably not used
much in the real world is called traffic analysis. It lets hackers
snoop on certain communication even when it’s encrypted.
For example, researchers from John Hopkins University in Maryland,
US, were able to decode encrypted voice-over-IP (VoIP) phone calls by
looking at the size of the encrypted packets. The sound “c” produced
small packets, but the sound “ow” produced a big packet, so a small
packet followed immediately by a large packet might mean someone said,
“cow”.
Other researchers and possibly hackers can use traffic analysis to
figure out all sorts of interesting things about your communication.
There’s no easy solution to traffic analysis—you have to hope the people
who make your software read the security journals. However, you can try
to avoid sending highly-sensitive information on the same wireless
communication network hackers use.
No comments:
Post a Comment