This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

Elcomsoft software means WiFi users should step up security

Share this article:

WiFi users have been urged to step up security as a Russian firm releases new software.

 

Global Secure Systems has said that the release of a WiFi password auditing utility by Russia's Elcomsoft should act as a wake-up call on the dangers of wireless insecurities to all IT managers.

 

David Hobson, managing director of GSS, claimed that the release of the Wireless Security Auditor by Elcomsoft moves the wireless security ballgame on by several stages as it highlights the fact that WiFi users need to be using more complex alpha-numeric passwords in order to protect their wireless networks, as well as consider wired connections wherever possible.

 

Hobson said: “Let's not beat about the bush here. If a user builds a custom PC with four high-end graphics cards and installs the £599 software, they then have a machine capable of tumbling wireless keys out of the ether and decrypting them in a matter of hours rather than months."

 

He claimed that the new software uses a wireless packet sniffing approach to the issue of encryption key retrieval, and then uses up to four high-end graphics cards installed on a PC to significantly accelerate what is, to all intents and purposes, a brute force attack on a given WiFi transmission.

 

If a WiFi user has employed an eight-character encryption key - currently the recommended norm for WPA – then Wireless Security Auditor can ‘retrieve' the password within a few hours, effectively giving a user near on-demand access to supposedly secure wireless transmissions.

 

Hobson said that the repercussions from the release of this software are that it drives a stake through the heart of the widespread usage of eight character WPA encryption keys as a means of protecting WiFi transmissions.

 

 

Hobson said: “It's a wake-up call to IT managers, pure and simple. IT managers should now move to 12 and even 16 character keys as a matter of urgency. It's not very user-friendly, but the potential consequences of staying with eight character keys do not bear thinking about.”

Share this article:

SC webcasts on demand

This is how to secure data in the cloud


Exclusive video webcast & Q&A sponsored by Vormetric


As enterprises look to take advantage of the cloud, they need to understand the importance of safeguarding their confidential and sensitive data in cloud environments. With the appropriate security safeguards, such as fine-grained access policies, a move to the cloud is as, or more, secure than an on-premise data storage.


View the webcast here to find out more

More in News

SharePoint users break own security rules

SharePoint users break own security rules

Privilege controls can work, but cannot cater for all eventualities, says Quocirca analyst Rob Bamforth.

Heartbleed slows down the internet

Heartbleed slows down the internet

As Hearbleed slows down the internet, experts say that two-factor authentication may the way forward to protect our web sessions.

Biometric data collection sparks privacy debate

Biometric data collection sparks privacy debate

You could be implicated as a criminal suspect, just by virtue of having that image in the non-criminal file, says the Electronic Frontier Foundation (EFF).