Wireless

Fluke Networks Releases New Signature Updates to Protect Against Emerging Wireless Security Threats and Vulnerabilities

21st November 2011
ES Admin
0
Fluke Networks today announced the release of new threat signature updates for its AirMagnet Enterprise 9.0 wireless intrusion detection and prevention system (WIDS/WIPS). The updates offer protection against wireless threats and vulnerabilities, including Karmetasploit and Apple’s new AirDrop feature. By utilizing its proprietary Dynamic Threat Update (DTU) technology, AirMagnet Enterprise offers the only wireless LAN (WLAN) security system on the market today that can quickly generate signature updates for immediate protection and automatically push them to customers without requiring scheduled downtime or additional IT resources.
“Our ability to immediately update against emerging threats is increasingly critical to both our enterprise and government customers given the growth in Wi-Fi networks and cybercrime,” said Jesse Frankel, product marketing manager at Fluke Networks and leader of the AirMagnet Intrusion Research Team. “In the last few months alone, the National Institute of Standards and Technology released updated security guidelines recommending that Federal agencies implement continuous monitoring in support of WLAN security – which they are now viewing as even more important than security monitoring for other types of systems1.”

To help protect AirMagnet Enterprise customers against the changing WLAN vulnerabilities and threats, the following new signature updates have been released:

AirDrop – Apple’s Mac OS® X Lion includes the new AirDrop feature that allows multiple users to share files wirelessly – which can be a violation of company security policies – creating security risks that could result in protected data being easily transferred to unknown machines outside of the enterprise network, potentially leaving the network vulnerable to other active attacks.

Karmetasploit – This is an aggressive man in the middle (MitM) style attack that tricks a client into associating with a device masquerading as an access point running KARMA. This allows a hacker to do any number of the following: gain access to the client machine, capture passwords, harvest data and conduct a wide variety of application exploits.

DHCP Starvation Attack – A DHCP starvation attack run from a wireless client can cause other clients to connect to a malicious network. Wireless guest networks and unencrypted commercial hotspots are especially vulnerable to this attack, which can lead to lost productivity or revenue.

The emergence of new threats and vulnerabilities like AirDrop, along with the evolution of sophisticated attack tools like Karmetasploit and viral SSIDs such as Free Public Wi-Fi, continue to prey upon wireless users who unwittingly expose corporate data and place their employer's assets at risk, said Lisa Phifer, president of network security consultancy Core Competence. New WIPS signatures are essential to quickly being able to alert IT of such attacks. An up-to-date, always-available WIPS, such as AirMagnet Enterprise, can help enterprises avoid costly data breaches and WLAN downtime that may result from otherwise-undetected threats such as these.

Product Spotlight

Upcoming Events

View all events
Newsletter
Latest global electronics news
© Copyright 2024 Electronic Specifier