Account
Please wait, authorizing ...

Don't have an account? Register here today.

×

New Wi-Fi attack can intercept data traffic

Nuevo ataque Wi-Fi puede interceptar el tráfico de datos

International. According to Kirk Jensen, Leading Marketing Innovation & Insight at WatchGuard Technologies, wireless access points (WAPs) and routers are among the devices that pose the most significant security risks to businesses.

The increasing complexity of networks and connected devices makes securing cybersecurity an increasingly complex task. Although in recent years there has been an increase in awareness of the importance of this discipline for companies, we continue to find some aspects of basic cyber hygiene that are ignored.

"Researchers have recently announced that wireless access points (WAPs) and routers are among the devices that pose the greatest security risk to companies. This concern, which we already mentioned in our blog a year ago, unfortunately has not changed much. In addition, new techniques such as the SSID confusion attack are emerging. To carry out this attack, cybercriminals exploit a gap in the IEEE 802.11 Wi-Fi standard to create fake Wi-Fi networks with names identical to those of legitimate networks. This tricks devices into connecting to the fraudulent network instead of the real thing. So, if the device is configured to disable VPN on trusted networks, this will be automatically disabled when connecting to the fake network, leaving the user's traffic exposed," Jensen explains.

In this way, attackers can intercept and spy on the user's confidential information, seriously compromising their security. What makes these devices a potential threat?

- Publicidad -

Default Settings
Many devices come pre-configured with settings that, while easy to install and use initially, make them vulnerable to cyberattacks. Among the main sensitive configurations we find weak passwords, open ports without protection or unnecessary services activated. If users do not modify them, these predefined accesses become a weak point that cybercriminals can exploit.

Lack of firmware updates
Firmware is the software that resides in the internal memory of devices, controlling crucial functions such as booting, hardware management, and communication with software. Keeping firmware up to date is an essential measure to ensure the security of computing devices. Outdated firmware exposes vulnerabilities that attackers can use to access sensitive information, take control of devices, or even spread malware on the network.

Constant connection to the network
The uninterrupted connectivity of these devices provides cybercriminals with a continuous access path. Many times these devices connect directly to the Internet without the necessary protection measures, such as firewalls or proper segmentation of the network infrastructure.

Critical Infrastructure
Wireless routers and access points are essential components of a company's critical infrastructure, acting as gateways between its networks and the outside world. If an attacker compromises these devices, they can gain access to a large portion of the network and other devices connected to it.

Lack of monitoring and management
Despite being critical to businesses, these devices often go unnoticed in terms of their importance in network security. A lack of proper monitoring and management can make them a blind spot for safety. Implementing tools that provide adequate visibility allows you to detect unusual activity, intrusion attempts, and other indicators of compromise.

It needs to be recognized that IT devices, such as routers and wireless access points, are critical to the connectivity of corporate networks, but they also represent a potential gateway for cyber threats. Implementing cybersecurity solutions specifically designed to protect these critical points is, without a doubt, essential today.

Having a tool that offers centralized management and monitoring, automated security updates, and strong encryption and authentication can ensure a secure wireless environment. In addition, the use of advanced firewalls that will offer comprehensive threat protection, including intrusion prevention, application control, web filtering, and spam blocking, is critical to protecting these devices from potential attacks.

Maintaining a proactive and robust cybersecurity posture is essential to meeting today's challenges and achieving a secure corporate network.

Álvaro León Pérez Sepúlveda
Author: Álvaro León Pérez Sepúlveda
Editor - Latin Press, Inc.
Comunicador Social Periodista egresado de la Universidad de Antioquia, con más de 14 años de experiencia en medios periodísticos y proyectos de comunicación digital. [email protected]

No thoughts on “New Wi-Fi attack can intercept data traffic”

• If you're already registered, please log in first. Your email will not be published.

Leave your comment

In reply to Some User
Suscribase Gratis
SUBSCRIBE TO OUR ENGLISH NEWSLETTER
DO YOU NEED A SERVICE OR PRODUCT QUOTE?
LATEST INTERVIEWS

Webinar: Para todas sus necesidades de seguridad

https://www.ventasdeseguridad.com/2... Para todas sus necesidades de seguridad Por: Eduardo Cortés Coronado, Representante Comercial en México - SECO-LARM USA INC Conozca la gama de productos más vendidos y de alta calidad de SECO-LARM que utilizan las empresas profesionales de seguridad, para así garantizar soluciones confiables y duraderas.

Webinar: Seguridad y transporte conectado: Sistemas predictivos para proteger y optimizar las rutas

https://www.ventasdeseguridad.com/2... Modera: Héctor Romero, Presidente de Círculo Logístico y Director General de TLR Logística Ponentes: Rafael Escobar, Channel Manager IoT/M2M Alai Secure León Rojas Madrid, CEO Lemad Logistics Jorge González, Commercial manager Telemetría de México Introducción y datos globales del mercado del transporte y la logística (México, Latam y Europa). Las nuevas tecnologías, con el objetivo de contribuir a la mejora de procesos y toma de decisiones, se abren paso para garantizar la seguridad de vehículos del transporte y la logística (telemetría y telemática vehicular, diseño y optimización de rutas…) Ir de la mano de un operador especializado en comunicaciones M2M/IoT como Alai Secure es clave para asegurar la estabilidad y disponibilidad del servicio y garantizar la conectividad durante toda la ruta.

Top 3 noticias más importantes de la industria de la seguridad electrónica

Entre los hechos destacados de esta semana se encuentra la realización de IntegraTEC México, el evento para integradores de tecnologías; así como la fusión empresarial de Milestone Systems con Arcules y la convocatoria para aspirar a las becas ofrecidas por el Foro SIA Mujeres en Seguridad. #Seguridad #SeguridadElectrónica #Videovigilancia #VentasDeSeguridad

Webinar: Inteligencia Artificial en NVR & Cámaras Enforcer

https://www.ventasdeseguridad.com/2... Tema: Inteligencia Artificial en NVR & Cámaras Enforcer Por: Eduardo Cortés Coronado, Representante Comercial en México - SECO-LARM USA INC Fecha: Martes 28 de mayo, 2024 Hora: 10.00H (Colombia) 09:00H (México) Conozca cómo sacar ventaja de las funciones de inteligencia artificial en NVR´S 4K & cámaras IP enforcer, disuación activa, reconocimiento facial, reconocimiento de matriculas vehiculares, salidas alarma etc.

Webinar: NxWitness el VMS rápido fácil y ultra ligero

Load more...
SITE SPONSORS










LATEST NEWSLETTER
Latest Newsletter