Forum for Science, Industry and Business

Sponsored by:     3M 
Search our Site:

 

’Evil twin’ hotspots are a new menace for internet users

20.01.2005


‘Evil Twin’ hotspots: the latest security threat to web users, according to wireless internet and cyber crime experts at Cranfield University, academic partner of the Defence Academy of the UK.



Dr Phil Nobles, wireless internet and cyber crime expert at the university, will be speaking at the wireless crime event at the Science Museum’s Dana Centre – the UK’s only venue for adults to discuss controversial science – on Thursday 20 January 2005 from19.00-20.30. He will explain the latest security threats to internet users and will also discuss wireless computing vulnerabilities that exist at present. “So-called ‘Evil Twin’ hotspots present a hidden danger for web users,” explained Dr Nobles.

"In essence, users think they’ve logged on to a wireless hotspot connection when, in fact, they’ve been tricked to connect to the attacker’s unauthorised base station. The latter jams the connection to a legitimate base station by sending a stronger signal within close proximity to the wireless client – thereby turning itself into an ‘Evil Twin’."


Once the user is connected to the ‘Evil Twin’, the cyber criminal can intercept data being transmitted, such as bank details or personal information. “Cyber criminals don’t have to be that clever to carry out such an attack,” added Dr Nobles. “Because wireless networks are based on radio signals, they can be easily detected by unauthorised users tuning into the same frequency.”

Unwitting web users are invited to log in to the attacker’s server with bogus login prompts and can pass sensitive data such as user names and passwords which can then be used by unauthorised third parties. This type of cyber crime goes largely undetected because users are unaware that this is taking place until well after the incident has occurred.

Attacks can also take the form of degrading the performance of the client network or a complete denial of service. The attacker can get the victim’s network to collude in the attack so that the degradation in network performance is less likely to be detected.

Professor Brian Collins, Head of Information Systems Department at Cranfield University, said: “Web users who use wi-fi networks should be on their guard against this type of cyber crime. “Given the spread and popularity of wireless internet networks – which, according to data research company IDC, is predicted to increase from 7,800 to nearly 22,000 by 2008 – users need to be wary of using their wi-fi enabled laptops or other portable devices to conduct financial transactions or anything of a sensitive or personal nature, for fear of disclosing this information to an unauthorised third party.”

Professor Collins continued: “Users can also protect themselves by ensuring that their wi-fi device has its security measures activated. In the vast majority of cases, base stations taken out of the box direct from the manufacturer are configured in the least secure mode possible.”

Cranfield University acknowledges that this is a new area of cyber crime where more research is required.

Lisa Jamieson, Head of Programmes at the Dana Centre, added: “Half of all business wireless networks in this country have inadequate security controls in place, making their information vulnerable to attack. At the Dana Centre we have in place a hardened firewall which protects the public using our wireless network from electronic attack.

“Through this event, the audience will be more aware of the potential risks and can find out how to ensure that they don’t become another cyber victim statistic.”

Ardi Kolah | alfa
Further information:
http://www.cranfield.ac.uk
http://www.cranfield.ac.uk/university/press/2005/14012005.cfm

More articles from Information Technology:

nachricht NASA CubeSat to test miniaturized weather satellite technology
10.11.2017 | NASA/Goddard Space Flight Center

nachricht New approach uses light instead of robots to assemble electronic components
08.11.2017 | The Optical Society

All articles from Information Technology >>>

The most recent press releases about innovation >>>

Die letzten 5 Focus-News des innovations-reports im Überblick:

Im Focus: A “cosmic snake” reveals the structure of remote galaxies

The formation of stars in distant galaxies is still largely unexplored. For the first time, astron-omers at the University of Geneva have now been able to closely observe a star system six billion light-years away. In doing so, they are confirming earlier simulations made by the University of Zurich. One special effect is made possible by the multiple reflections of images that run through the cosmos like a snake.

Today, astronomers have a pretty accurate idea of how stars were formed in the recent cosmic past. But do these laws also apply to older galaxies? For around a...

Im Focus: Visual intelligence is not the same as IQ

Just because someone is smart and well-motivated doesn't mean he or she can learn the visual skills needed to excel at tasks like matching fingerprints, interpreting medical X-rays, keeping track of aircraft on radar displays or forensic face matching.

That is the implication of a new study which shows for the first time that there is a broad range of differences in people's visual ability and that these...

Im Focus: Novel Nano-CT device creates high-resolution 3D-X-rays of tiny velvet worm legs

Computer Tomography (CT) is a standard procedure in hospitals, but so far, the technology has not been suitable for imaging extremely small objects. In PNAS, a team from the Technical University of Munich (TUM) describes a Nano-CT device that creates three-dimensional x-ray images at resolutions up to 100 nanometers. The first test application: Together with colleagues from the University of Kassel and Helmholtz-Zentrum Geesthacht the researchers analyzed the locomotory system of a velvet worm.

During a CT analysis, the object under investigation is x-rayed and a detector measures the respective amount of radiation absorbed from various angles....

Im Focus: Researchers Develop Data Bus for Quantum Computer

The quantum world is fragile; error correction codes are needed to protect the information stored in a quantum object from the deteriorating effects of noise. Quantum physicists in Innsbruck have developed a protocol to pass quantum information between differently encoded building blocks of a future quantum computer, such as processors and memories. Scientists may use this protocol in the future to build a data bus for quantum computers. The researchers have published their work in the journal Nature Communications.

Future quantum computers will be able to solve problems where conventional computers fail today. We are still far away from any large-scale implementation,...

Im Focus: Wrinkles give heat a jolt in pillared graphene

Rice University researchers test 3-D carbon nanostructures' thermal transport abilities

Pillared graphene would transfer heat better if the theoretical material had a few asymmetric junctions that caused wrinkles, according to Rice University...

All Focus news of the innovation-report >>>

Anzeige

Anzeige

Event News

Ecology Across Borders: International conference brings together 1,500 ecologists

15.11.2017 | Event News

Road into laboratory: Users discuss biaxial fatigue-testing for car and truck wheel

15.11.2017 | Event News

#Berlin5GWeek: The right network for Industry 4.0

30.10.2017 | Event News

 
Latest News

NASA detects solar flare pulses at Sun and Earth

17.11.2017 | Physics and Astronomy

NIST scientists discover how to switch liver cancer cell growth from 2-D to 3-D structures

17.11.2017 | Health and Medicine

The importance of biodiversity in forests could increase due to climate change

17.11.2017 | Studies and Analyses

VideoLinks
B2B-VideoLinks
More VideoLinks >>>