{"id":593,"date":"2016-01-03T09:00:20","date_gmt":"2016-01-03T08:00:20","guid":{"rendered":"https:\/\/www.boc.de\/watchguard-info-portal\/?p=593"},"modified":"2016-06-16T17:17:42","modified_gmt":"2016-06-16T15:17:42","slug":"watchguard-security-prediction-9-spies-slip-into-wireless-alliances","status":"publish","type":"post","link":"https:\/\/wordpress.boc.de\/watchguard-info-portal\/2016\/01\/watchguard-security-prediction-9-spies-slip-into-wireless-alliances\/","title":{"rendered":"WatchGuard Security Vorhersage 2016 #9 \u2013 Spies Slip Into Wireless Alliances"},"content":{"rendered":"<table width=\"100%\">\n<tbody>\n<tr>\n<td><\/td>\n<td>\n<h2><a href=\"http:\/\/watchguardsecuritycenter.com\/2015\/12\/15\/watchguard-security-prediction-9-spies-slip-into-wireless-alliances\/\"><u>WatchGuard Security Prediction #9 \u2013 Spies Slip Into Wireless\u00a0Alliances<\/u><\/a><\/h2>\n<p>by <a href=\"http:\/\/watchguardsecuritycenter.com\/author\/coreynach\/\"><u>Corey Nachreiner<\/u><\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>To be honest, wireless security hasn\u2019t changed too much in the last few years. That\u2019s not to say it\u2019s perfectly secure. There are still plenty of folks using legacy WEP encryption standards, and organizations that use WPA2-PSK with a horrible password. There are also many wireless networks that don\u2019t segment clients, so attackers can sniff plenty of private connections by hanging out on public hotspots. Furthermore, many SMB organizations haven\u2019t solved the problem of rogue hotspots or evil twin hotspots. That said, there hasn\u2019t been a huge, industry-wide wireless standard vulnerability in quite awhile.<\/p>\n<p><em>Prediction video link: <a href=\"https:\/\/youtu.be\/A4m6D6fqmWA\"><u>https:\/\/youtu.be\/A4m6D6fqmWA<\/u><\/a><\/em><\/p>\n<p>While we don\u2019t know exactly what it\u2019ll be, we suspect the next big wireless vulnerability will have to do with an \u201cease-of-use\u201d feature. The <a href=\"https:\/\/en.wikipedia.org\/wiki\/Wi-Fi_Protected_Setup\"><u>Wi-Fi Protected Setup (WPS)<\/u><\/a> standard was a great example of this possibility. WPS was designed to make it easier for new users to join a secure wireless network without having to remember a complex password. Unfortunately, it suffered from a flaw that made it easy for attackers to brute-force a WPS pin and gain access to the wireless network quickly. Unfortunately, usability features can sometimes clash with real security.<\/p>\n<p>Recently, Windows included a new wireless feature <a href=\"http:\/\/arstechnica.com\/gadgets\/2015\/07\/wi-fi-sense-in-windows-10-yes-it-shares-your-passkeys-no-you-shouldnt-be-scared\/\"><u>called Sense<\/u><\/a>. This feature is intended to allow you to automatically connect to secure wireless networks that your friends or acquaintances have used. While no one has found any issue with this feature yet, this is the type of feature that may introduce new wireless problems. In 2016, expect the next wireless security vulnerability to involve an ease of use feature like Sense.<\/p>\n<p>Visit our\u00a0<a href=\"http:\/\/www.watchguard.com\/2016predictions\"><u>WatchGuard security predictions site<\/u><\/a><\/p>\n<p><strong><em>\u2014\u00a0<\/em><\/strong><a href=\"http:\/\/www.watchguard.com\/corporate-info\/speakers-bureau.asp#coreyn\"><em><u>Corey Nachreiner, CISSP<\/u><\/em><\/a><em>\u00a0(<\/em><a href=\"http:\/\/twitter.com\/SecAdept\"><em><u>@SecAdept<\/u><\/em><\/a><em>)<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>WatchGuard Security Prediction #9 \u2013 Spies Slip Into Wireless\u00a0Alliances by Corey Nachreiner To be honest, wireless security hasn\u2019t changed too much in the last few years. That\u2019s not to say it\u2019s perfectly secure. There are still plenty of folks using legacy WEP encryption standards, and organizations that use WPA2-PSK with a horrible password. There are also many wireless networks that don\u2019t segment clients, so attackers &hellip; <a href=\"https:\/\/wordpress.boc.de\/watchguard-info-portal\/2016\/01\/watchguard-security-prediction-9-spies-slip-into-wireless-alliances\/\" class=\"more-link\">Weiterlesen <span class=\"screen-reader-text\">WatchGuard Security Vorhersage 2016 #9 \u2013 Spies Slip Into Wireless Alliances<\/span> <span class=\"meta-nav\">&raquo;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-593","post","type-post","status-publish","format-standard","hentry","category-watchguard-allgemeine-informationen"],"_links":{"self":[{"href":"https:\/\/wordpress.boc.de\/watchguard-info-portal\/wp-json\/wp\/v2\/posts\/593"}],"collection":[{"href":"https:\/\/wordpress.boc.de\/watchguard-info-portal\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wordpress.boc.de\/watchguard-info-portal\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wordpress.boc.de\/watchguard-info-portal\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/wordpress.boc.de\/watchguard-info-portal\/wp-json\/wp\/v2\/comments?post=593"}],"version-history":[{"count":2,"href":"https:\/\/wordpress.boc.de\/watchguard-info-portal\/wp-json\/wp\/v2\/posts\/593\/revisions"}],"predecessor-version":[{"id":598,"href":"https:\/\/wordpress.boc.de\/watchguard-info-portal\/wp-json\/wp\/v2\/posts\/593\/revisions\/598"}],"wp:attachment":[{"href":"https:\/\/wordpress.boc.de\/watchguard-info-portal\/wp-json\/wp\/v2\/media?parent=593"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wordpress.boc.de\/watchguard-info-portal\/wp-json\/wp\/v2\/categories?post=593"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wordpress.boc.de\/watchguard-info-portal\/wp-json\/wp\/v2\/tags?post=593"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}