SHARE
Facebook X Pinterest WhatsApp

Notebook Users Under Attack at Security Conference

You might think attendees at a security conference would take extra precautions to ensure their notebook’s safety. Think again. According to mobile security vendor AirDefense, some 56 percent of 623 wireless devices at the RSA conference in San Francisco were susceptible to attacks based on its study of wireless traffic at the show Tuesday. But […]

Written By
thumbnail David Needle
David Needle
Feb 8, 2007
Datamation content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

You might think attendees at a security conference would take extra
precautions to ensure their notebook’s safety. Think again.

According to mobile security vendor AirDefense, some 56 percent of 623 wireless devices at the RSA
conference
in San Francisco were susceptible to attacks based on its
study of wireless traffic at the show Tuesday.

But AirDefense puts the blames on users, not conference organizer RSA.

“RSA does a good job of providing a secure network as good as any
standard corporate network,” Richard Rushing, chief security officer at
AirDefense, told internetnews.com.

The problem, Rushing said, is that among the thousands of attendees with notebook computers, PDAs and other wireless devices, most are vulnerable to attack because they use or maintain an open access wireless account separate from the conference network.

“People are using wireless, which is a good thing,” said Rushing, “but
they’re connecting at hotels and hotspots in an insecure manner.” Even if
the user intends to use a secure network as a main point of access, these
open accounts, if not deleted from a user’s preferred list of network access
points, can be exploited.

Specifically, Rushing said AirDefense identified 70 devices onsite at the
conference participating in ad-hoc, peer-to-peer
(define) networks using common SSID’s (Service Set
Identifiers) (define) such as “Free Public WiFi,” “Free Internet
Access” and “Linksys.” Use of these networks typically means no firewall is
present on the wireless interface, or it is an un-patched Windows system
that can be readily exploited.

“It’s low-hanging fruit for attackers,” said Rushing.

This article was first published on InternetNews.com. To read the full article, click here.

  SEE ALL
ARTICLES
 
thumbnail David Needle

David Needle is a veteran technology reporter based in Silicon Valley. He covers mobile, big data, customer experience, and social media, among other topics. He was formerly news editor at Infoworld, editor of Computer Currents and TabTimes, and West Coast bureau chief for both InformationWeek and Internet.com.

Recommended for you...

AI in Cybersecurity: The Comprehensive Guide to Modern Security
Liz Ticong
Apr 29, 2024
What Is Cybersecurity? Definitions, Practices, Threats
Liz Ticong
Apr 8, 2024
How to Secure a Network: 9 Key Actions to Secure Your Data
Liz Ticong
Mar 21, 2024
7 Best Data Security Software: Solutions For 2024
Datamation Logo

Datamation is the leading industry resource for B2B data professionals and technology buyers. Datamation's focus is on providing insight into the latest trends and innovation in AI, data security, big data, and more, along with in-depth product recommendations and comparisons. More than 1.7M users gain insight and guidance from Datamation every year.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.