This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

Elcomsoft software means WiFi users should step up security

Share this article:

WiFi users have been urged to step up security as a Russian firm releases new software.


Global Secure Systems has said that the release of a WiFi password auditing utility by Russia's Elcomsoft should act as a wake-up call on the dangers of wireless insecurities to all IT managers.


David Hobson, managing director of GSS, claimed that the release of the Wireless Security Auditor by Elcomsoft moves the wireless security ballgame on by several stages as it highlights the fact that WiFi users need to be using more complex alpha-numeric passwords in order to protect their wireless networks, as well as consider wired connections wherever possible.


Hobson said: “Let's not beat about the bush here. If a user builds a custom PC with four high-end graphics cards and installs the £599 software, they then have a machine capable of tumbling wireless keys out of the ether and decrypting them in a matter of hours rather than months."


He claimed that the new software uses a wireless packet sniffing approach to the issue of encryption key retrieval, and then uses up to four high-end graphics cards installed on a PC to significantly accelerate what is, to all intents and purposes, a brute force attack on a given WiFi transmission.


If a WiFi user has employed an eight-character encryption key - currently the recommended norm for WPA – then Wireless Security Auditor can ‘retrieve' the password within a few hours, effectively giving a user near on-demand access to supposedly secure wireless transmissions.


Hobson said that the repercussions from the release of this software are that it drives a stake through the heart of the widespread usage of eight character WPA encryption keys as a means of protecting WiFi transmissions.



Hobson said: “It's a wake-up call to IT managers, pure and simple. IT managers should now move to 12 and even 16 character keys as a matter of urgency. It's not very user-friendly, but the potential consequences of staying with eight character keys do not bear thinking about.”

Share this article:

SC webcasts on demand

This is how to secure data in the cloud

Exclusive video webcast & Q&A sponsored by Vormetric

As enterprises look to take advantage of the cloud, they need to understand the importance of safeguarding their confidential and sensitive data in cloud environments. With the appropriate security safeguards, such as fine-grained access policies, a move to the cloud is as, or more, secure than an on-premise data storage.

View the webcast here to find out more

More in News

Google and Facebook offer free cyber-security tools

Google and Facebook offer free cyber-security tools

Google and Facebook have both launched free open-source cyber-security tools this week, designed to help security professionals spot malware and cyber-attacks.

Mixed results for key Government cyber-initiatives

Mixed results for key Government cyber-initiatives

The Government's Verify scheme to confirm IDs is behind scheuduled uptake, but its CISP threat intelligence sharing scheme is ahead of target.

Hundreds of companies face 2,000 cyber-attacks in EU exercise

Hundreds of companies face 2,000 cyber-attacks in EU ...

The European Network and Information Security Agency (ENISA) conducted a 24-hour cyber-exercise in which more than 200 organisations from 25 EU member states faced virtual cyber-attacks from white hat hackers ...