The case of the stolen Wi-Fi: What you need to know
Don't let your wireless network play host to strangers, say security experts
IDG News Service - Benjamin Smith III and Gregory Straszkiewicz both were arrested for allegedly stealing something no one could see, hear or feel. That thing was valuable enough for victims to press charges in both cases. But the arrests were over something many consumers throw out their windows every day: a Wi-Fi signal.
The idea of a police car roaring down the street to catch a roving Doom junkie using someone else's wireless LAN may seem silly, but there are real dangers if your network plays host to strangers. The hazards you might face include eavesdropping, theft of data, painful legal hassles or even a conviction for computer-related crimes. And if you casually tap into your neighbor's Wi-Fi sometimes, these arrests -- Smith was arrested in Florida and Straszkiewicz in Isleworth, U.K. -- signal that it's at least possible you might run afoul of a law and an irritated fellow citizen.
On April 21, Richard Dinon of St. Petersburg, Fla., called police after he saw Smith in a car on the street outside his house using a notebook computer. Smith, 40, was arrested and charged with a felony under a Florida law that prohibits unauthorized access to a computer or network, according to police. A pretrial hearing is set for Sept. 8. In July, a court in Isleworth convicted Straszkiewicz of using a laptop to access the Internet over unprotected residential WLANs on several occasions. He was fined $874 and got a 12-month conditional discharge.
A typical home Wi-Fi signal can transmit about 150 ft. from an access point or router. Walls and windows will slow it down, but if it reaches the edge of your property, it won't stop there. In densely populated areas, it's common for a Wi-Fi device such as a notebook to detect multiple residential networks from one place.
It's not hard for even an innocent user to tap into a broadband Internet connection via an unprotected WLAN: As soon as the Wi-Fi client detects the network, the user can click on it and join. Some broadband subscribers even like opening their networks. But Internet access may not be the only thing being shared.
"People who steal bandwidth aren't necessarily going to stop there; they might steal data as well," said Gartner Inc. analyst Richard Hunter. Most consumers wouldn't even know if a stranger was using the network, he added.
"If you've got an unprotected Wi-Fi network and you are in any kind of populated area, then you really should do something to protect that," Hunter said.
Specifically, on a Windows PC, an intruder on your
- 5 Things You Didn't Know About Cloud Backup IT departments are embracing cloud backup, but there's a lot you need to know before choosing a service provider. Learn all the critical...
- What is this "File Sync" Thing and Why Should I Care About It? All of a sudden, getting a file from your work laptop to your iPad became as simple as clicking "Save." So it's no...
- The Truth About Cloud Security "Security" is the number one issue holding business leaders back from the cloud. But does the reality match the perception?
- The 5 Big Lies About Going Mobile You've heard about the power of mobile to change your business. But have you realized your mobile potential? It's about much more than...
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to...
- Will the Real Endpoint Threat Detection and Response Please Stand Up? This webinar explores new technologies & process for protecting endpoints from advanced attackers as well as the innovations that are pushing the envelope... All Gov't Legislation/Regulation White Papers | Webcasts