Datamation content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.
You might think attendees at a security conference would take extra
precautions to ensure their notebook’s safety. Think again.
According to mobile security vendor AirDefense, some 56 percent of 623 wireless devices at the RSA
conference in San Francisco were susceptible to attacks based on its
study of wireless traffic at the show Tuesday.
But AirDefense puts the blames on users, not conference organizer RSA.
“RSA does a good job of providing a secure network as good as any
standard corporate network,” Richard Rushing, chief security officer at
AirDefense, told internetnews.com.
The problem, Rushing said, is that among the thousands of attendees with notebook computers, PDAs and other wireless devices, most are vulnerable to attack because they use or maintain an open access wireless account separate from the conference network.
“People are using wireless, which is a good thing,” said Rushing, “but
they’re connecting at hotels and hotspots in an insecure manner.” Even if
the user intends to use a secure network as a main point of access, these
open accounts, if not deleted from a user’s preferred list of network access
points, can be exploited.
Specifically, Rushing said AirDefense identified 70 devices onsite at the
conference participating in ad-hoc, peer-to-peer
(define) networks using common SSID’s (Service Set
Identifiers) (define) such as “Free Public WiFi,” “Free Internet
Access” and “Linksys.” Use of these networks typically means no firewall is
present on the wireless interface, or it is an un-patched Windows system
that can be readily exploited.
“It’s low-hanging fruit for attackers,” said Rushing.
This article was first published on InternetNews.com. To read the full article, click here.
RELATED NEWS AND ANALYSIS
-
Huawei’s AI Update: Things Are Moving Faster Than We Think
FEATURE | By Rob Enderle,
December 04, 2020
-
Keeping Machine Learning Algorithms Honest in the ‘Ethics-First’ Era
ARTIFICIAL INTELLIGENCE | By Guest Author,
November 18, 2020
-
Key Trends in Chatbots and RPA
FEATURE | By Guest Author,
November 10, 2020
-
Top 10 AIOps Companies
FEATURE | By Samuel Greengard,
November 05, 2020
-
What is Text Analysis?
ARTIFICIAL INTELLIGENCE | By Guest Author,
November 02, 2020
-
How Intel’s Work With Autonomous Cars Could Redefine General Purpose AI
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
October 29, 2020
-
Dell Technologies World: Weaving Together Human And Machine Interaction For AI And Robotics
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
October 23, 2020
-
The Super Moderator, or How IBM Project Debater Could Save Social Media
FEATURE | By Rob Enderle,
October 16, 2020
-
Top 10 Chatbot Platforms
FEATURE | By Cynthia Harvey,
October 07, 2020
-
Finding a Career Path in AI
ARTIFICIAL INTELLIGENCE | By Guest Author,
October 05, 2020
-
CIOs Discuss the Promise of AI and Data Science
FEATURE | By Guest Author,
September 25, 2020
-
Microsoft Is Building An AI Product That Could Predict The Future
FEATURE | By Rob Enderle,
September 25, 2020
-
Top 10 Machine Learning Companies 2020
FEATURE | By Cynthia Harvey,
September 22, 2020
-
NVIDIA and ARM: Massively Changing The AI Landscape
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
September 18, 2020
-
Continuous Intelligence: Expert Discussion [Video and Podcast]
ARTIFICIAL INTELLIGENCE | By James Maguire,
September 14, 2020
-
Artificial Intelligence: Governance and Ethics [Video]
ARTIFICIAL INTELLIGENCE | By James Maguire,
September 13, 2020
-
IBM Watson At The US Open: Showcasing The Power Of A Mature Enterprise-Class AI
FEATURE | By Rob Enderle,
September 11, 2020
-
Artificial Intelligence: Perception vs. Reality
FEATURE | By James Maguire,
September 09, 2020
-
Anticipating The Coming Wave Of AI Enhanced PCs
FEATURE | By Rob Enderle,
September 05, 2020
-
The Critical Nature Of IBM’s NLP (Natural Language Processing) Effort
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
August 14, 2020