There is a very good article in the March 12 San Francisco Chronicle about WiFi's security hazards. SNAFU raised similar issues in its initial opposition to Mayor Newsom's WiFi initiative back in September 2005. It's easy to spy on your Wi-Fi / Experts say home networks are particularly vulnerable
It's easy to spy on your Wi-Fi
Experts say home networks are particularly vulnerable Dan Fost, Chronicle Staff Writer
Monday, March 12, 2007
When many of the computer industry's top security gurus gathered in San Francisco last month for a conference, an Atlanta company decided to point its radar toward the airwaves and see how much of the show's wireless activity it could see.
The distressing and ironic answer? The Boston hackers could eavesdrop on more than half of the wireless traffic ... at a security conference!
If most of the people attending last month's RSA Conference have not taken the basic precautions to protect their online activity while using public Wi-Fi, then what of all those civilians setting up shop in cafes and airports?
In short, say computer security experts, people are putting themselves at risk every day.
The risk could be reaching one of its highest levels as the country approaches tax season and some of the most sensitive personal and financial information travels the Wi-Fi airwaves. More than 73 million people filed their taxes electronically last year, according to the Internal Revenue Service, and 46 million have already done so this year.
"When it comes to wireless security, there is a profound amount of user indifference. You don't really see what you are getting yourself into,"
said Amit Sinha, chief technology officer of AirDefense, the Atlanta company that conducted "wireless airwave monitoring" one morning at the RSA Conference. AirDefense found that 56 percent of 623 devices -- laptops, cell phones, personal digital assistants and PCs -- were susceptible to attacks.
Sandra Toms LaPedis, area vice president and general manager of RSA Conferences, said the conference's Wi-Fi network was secure -- and in fact drew complaints because it was so hard to access. But companies with booths at Moscone Center set up their own wireless networks, which were much easier to compromise.
"It underscores the battle (information technology) professionals are undertaking in corporations, as they try to get their people to understand the risks that are out there," LaPedis said.
The risks are everywhere, not just in the cafes.
"Wi-Fi, as implemented out of the box, is not only not secure, it's promiscuous," said David Perry, director of global education for Trend Micro, a Japanese maker of security software.
If you use it at home, you're likely to be opening yourself up to attacks unless you take precautions. If you use Wi-Fi in a cafe, "It turns your network into a radio station," Perry said. Or you could be connecting to an "evil twin" -- a Wi-Fi network set up by a bad guy posing as the cafe's network.
And if you use a publicly available computer, such as one in a library, "assume that it's compromised," Perry said. "A lot of those are infected with keyloggers, screenscrapers, bots, rootkits, data stealers, all kinds of stuff."
At the Black Hat Convention in Washington last month, where security experts gather to marshal forces against the dark side of computing, Robert Graham of Errata Security, a high-end firm in Atlanta, demonstrated his new tool, Ferret. It impressed even the wizards at Black Hat with its ability to watch all the traffic in a network. Graham has made the tool available free on his Web site.
"We demonstrated how open people are, and how much they're broadcasting to the world, even if they're using (security tools such as) virtual private networks and encryption," Graham said.
In addition to the threats in public, many people do not secure their home Wi-Fi networks, sometimes because of the hassle, and sometimes because of an egalitarian impulse to share their Wi-Fi. After all, many well-meaning people have participated in "wardriving," the practice of driving around a neighborhood until you find a connection you can piggyback onto without needing a password. Sinha at AirDefense said the Web site WiGLE - Wireless Geographic Logging Engine - Plotting WiFi on Maps
lists more than 9 million such connections that users have entered, a number growing daily.
"The home presents even more vulnerabilities than hotspot environments,"
said Stu Elefant, senior product manager at McAfee Inc., the security software firm in Santa Clara.
"With wireless networks, your data is being transmitted over the open air," Elefant said. "Anyone can grab those data packets. And they can jump on your home wireless network to do bad things to you, and to other people. It's as if they came in your front door and plugged into your network. They can look for vulnerabilities, out-of-date security software, unpatched operating system holes," and they can set up your computer as a "bot" or "zombie" that they can use for other attacks.
"Wireless gives them a semblance of anonymity," he said. "They can launch spam on other people, launch virus attacks on other people, steal pirated material, and the homeowner is the one who is going to get the knock on the door from the FBI."
And while it might feel unlikely that someone will drive through a particular neighborhood looking for a Wi-Fi network to exploit, Elefant said they don't need to. "It's been proven through Defcon, an industry trade association, that wireless networks can be connected to from 100 miles away with a high-gain antenna."
But all the scary rhetoric doesn't mean there are no solutions out there. There are many things people can do to make themselves safer, but those things often mean spending a little money and time.
Two of the most popular solutions are from Bay Area security software companies Symantec and McAfee. McAfee Wireless Protection sells for
$29.99 for a year and its flagship McAfee Total Protection is $59.99.
Total Protection offers a more complete suite, including firewall, backup, antivirus and antispam. Symantec's Norton Internet Security 2007 features antivirus and firewall, among other things, and is priced at
$69.99 for a year's subscription; Norton 360 is $79.99 for one year and includes backup and tuneup, and is billed as being more comprehensive and easier to use. Both companies' products may be installed on up to three machines.
One small free solution is from San Francisco's OpenDNS, which offers a new approach to the Internet's Domain Name System. While OpenDNS says it can speed up Web cruising, it says one other benefit is that it can tell what is a real site and what is an "evil twin," even if there is no difference to even the most experienced user.
"Users who set up OpenDNS are prevented from getting pharming attacks when using compromised access points at Internet cafes," said David Ulevitch, the chief executive.
AirDefense also offers a free download, AirDefense Personal, that protects against evil twins, although most of its products sell for more than $1,000 to large corporations.
With the solutions available, people should feel somewhat safer in their online interactions. Run everything through what Paul Miller, managing director of Symantec's mobile security group, calls a "secure tunnel,"
and you should be safe.
"It's up to you to have good security," he said. "We want to foster confidence in a connected world."
Safe wireless surfing
Security experts offer these tips when using wireless Internet access:
-- Use a suite of security software, including a firewall, like those available from McAfee, Symantec and Trend Micro. Make sure your software is up to date. Some companies, such as Webroot of Boulder, Colo., offer free scans of your system from their Web sites.
-- When logging on in a cafe or hotel, make sure you find out from an employee what the name of the network is, so you don't fall for a phony network set up by a hacker.
-- Change the password when you set up your router at home.
-- Try using OpenDNS, a free service at OpenDNS | Providing A Safer And Faster DNS
, which will change the router's settings and, among other things, prevent pharming attacks (in which you think you're entering data at, say, your bank's Web site, but really you're at a fake site).
-- When on a secure financial site, make sure the address bar reads https (the "s" at the end stands for "secure") and that a picture of a lock shows up next to the address.
-- To get particularly tricky, when setting up your laptop, Robert Graham of Atlanta's Errata Security suggests giving yourself a gender-bending sign-in. If your name is Bob, make your sign-in Mary.
Most hackers wouldn't suspect people of lying to their own computer, and it will throw them off the trail of your data.
-- If you get confused, call tech support for the router or the security software. You can also pay for a service like Best Buy's Geek Squad to fix the problem.
Source: Chronicle research