Translate

Wednesday, December 8, 2010

Got a Wireless Network? It’s Time to Shore Up Security


Some words to the wise: if you have a wireless Internet or network connection, make sure you’ve got the best possible security measures in place. And don’t delay.

Why? We’ve recently learned that the basic protection against intruders-Wireless Encryption Protocol, or WEP-is increasingly vulnerable to accomplished hackers.

The tip came from one of the members of the FBI's longstanding InfraGard program, which brings together public and private sector security professionals to share breaking information on threats and vulnerabilities, particularly in the cyber world.

The member of that group alerted the FBI's Birmingham, Alabama, office about computer hackers in Europe who have developed a method for cutting through the security provided by the WEP within a matter of seconds-and who are ready to share that secret.

Paul Daymond, said, from the FBI's Birmingham office“We knew once that information got out-and it most likely would-these vulnerabilities were going to be exploited.” “So we needed to get the word out quickly.”

What is WEP? In layman’s terms, it’s one way computers try to keep unauthorized users from tapping into your wireless network. A wireless network is more vulnerable to outside hackers than a closed one, which physically connects computers with cables.

WEP is generally the lowest level of security that comes with a new wireless network. Hackers have been improving their ability to get around the security settings in WEP for years. They know that most people don’t even bother to set up password protection, and when they do, they simply use the default.

That can be a boon to “war drivers,” people who drive around looking for unsecured wireless Internet access points to hijack. After they tap into the connection, they can do all sorts of things-including illegally sending spam or pilfering your computer’s data, like Nicholas Tombros did a few years ago.

You might not even know if these hackers have gained access to your connection. They may be a couple houses over or on the next street. But if they’re doing something illegal with your Internet connection, it’s going to come back to you.

So what can you do? At the very least, set up password protection and change the default and security settings on the WEP, if that’s what you’re using. Then I recommend you consider changing your wireless security to an even more secure protocol, like WPA2, TKIP, or AES.

Don’t know how to do that? Check the website of your wireless router manufacturer. All of the major companies have websites devoted to security.

“There’s a lot of information out there about making your wireless system more secure,” says James E. Finch, assistant director of the FBI's Cyber Division. “We recommend taking a layered security approach. That is, throw as many locks on the computer to thwart these hackers as possible.”

Good advice…and I hope you take it.


REMEMBER: Criminals will do just about anything to get what you have for their own personal gain; if you are not extremely careful you could be a big loser.

-Birdy

No comments:

Post a Comment

Please be considerate of others, and please do not post any comment that has profane language. Please Do Not post Spam. Thank you.

Powered By Blogger

Labels

Abduction (2) Abuse (3) Advertisement (1) Agency By City (1) Agency Service Provided Beyond Survival Sexual Assault (1) Aggressive Driving (1) Alcohol (1) ALZHEIMER'S DISEASE (2) Anti-Fraud (2) Aspartame (1) Assault (1) Auto Theft Prevention (9) Better Life (1) Books (1) Bribery (1) Bullying (1) Burglary (30) Car Theft (8) Carjackng (2) Child Molestation (5) Child Sexual Abuse (1) Child Abuse (2) Child Kidnapping (3) Child Porn (1) Child Rape (3) Child Safety (18) Child Sexual Abuse (9) Child Violence (1) Classification of Crime (1) Club Drugs (1) College (1) Computer (4) Computer Criime (4) Computer Crime (8) Confessions (2) CONFESSIONS (7) Cons (2) Credit Card Scams (2) Crime (11) Crime Index (3) Crime Prevention Tips (14) Crime Tips (31) Criminal Activity (1) Criminal Behavior (3) Crimm (1) Cyber-Stalking (2) Dating Violence (1) Deviant Behavior (6) Domestic Violence (7) E-Scams And Warnings (1) Elder Abuse (9) Elder Scams (1) Empathy (1) Extortion (1) Eyeballing a Shopping Center (1) Facebook (9) Fakes (1) Family Security (1) Fat People (1) FBI (1) Federal Law (1) Financial (2) Fire (1) Fraud (9) FREE (4) Fun and Games (1) Global Crime on World Wide Net (1) Golden Rules (1) Government (1) Guilt (2) Hackers (1) Harassment (1) Help (2) Help Needed (1) Home Invasion (2) How to Prevent Rape (1) ID Theft (96) Info. (1) Intent (1) Internet Crime (6) Internet Fraud (1) Internet Fraud and Scams (7) Internet Predators (1) Internet Security (30) Jobs (1) Kidnapping (1) Larceny (2) Laughs (3) Law (1) Medician and Law (1) Megans Law (1) Mental Health (1) Mental Health Sexual (1) Misc. (11) Missing Cash (5) Missing Money (1) Moner Matters (1) Money Matters (1) Money Saving Tips (11) Motive (1) Murder (1) Note from Birdy (1) Older Adults (1) Opinion (1) Opinions about this article are Welcome. (1) Personal Note (2) Personal Security and Safety (12) Porn (1) Prevention (2) Price of Crime (1) Private Life (1) Protect Our Kids (1) Protect Yourself (1) Protection Order (1) Psychopath (1) Psychopathy (1) Psychosis (1) PTSD (2) Punishment (1) Quoted Text (1) Rape (66) Ravishment (4) Read Me (1) Recovery (1) Regret (1) Religious Rape (1) Remorse (1) Road Rage (1) Robbery (5) Safety (2) SCAM (19) Scams (62) Schemes (1) Secrets (2) Security Threats (1) Serial Killer (2) Serial Killer/Rapist (4) Serial Killers (2) Sexual Assault (16) Sexual Assault - Spanish Version (3) Sexual Assault against Females (5) Sexual Education (1) Sexual Harassment (1) Sexual Trauma. (4) Shame (1) Sociopath (2) Sociopathy (1) Spam (6) Spyware (1) SSN's (4) Stalking (1) State Law (1) Stress (1) Survival (2) Sympathy (1) Tax Evasion (1) Theft (13) this Eve (1) Tips (13) Tips on Prevention (14) Travel (5) Tricks (1) Twitter (1) Unemployment (1) Victim (1) Victim Rights (9) Victimization (1) Violence against Women (1) Violence. (3) vs. (1) Vulnerable Victims (1) What Not To Buy (2)