Network Chemistry Protects Laptops From Intel Wireless Attacks

By | August 8, 2006

Network Chemistry announced that its Rfprotect family of wireless threat protection solutions can be used to protect companies and government organizations against the increasing threats posed by vulnerable wireless cards used in employee laptops.

The presentations by security experts at DEFCON demonstrated how hackers can use malformed frames or packets to exploit vulnerabilities in wireless drivers, remotely executing malicious code of their choice on target machines and devices. More importantly, this puts corporate assets directly at risk as attackers can then obtain access to critical network information and confidential data. These vulnerabilities are caused by poor coding and or testing in the wireless drivers of standard wireless cards including those from Intel and Apple. To put the risk into perspective, at DEFCON, over 60 percent of the security professionals in attendance were using wireless cards from these two vendors.

In the case of the attacks using malformed frames, the packets hit at the lowest level in the stack, thereby avoiding most detection capabilities. Firewalls and antivirus solutions will not defend against these attacks. This lack of protection reinforces the need for a wireless threat protection overlay solution that can monitor traffic in the airwaves looking for such attacks. By using Network Chemistry´s industry-leading RFprotect platform, organizations can detect malformed packet attacks against wireless drivers and prevent them through sophisticated identification and tracking of authorized clients showing all vulnerable laptops.

“The risk of these wireless attacks is real and extensive given that larger companies and government organizations often have thousands of laptops using these wireless cards,” said Dr. Chris Waters, CTO at Network Chemistry. “Mitigating the threat of attacks that exploit wireless cards is just one of many ways that organizations can use the RFprotect platform to ensure the protection of their wireless networks, data and corporate assets in the most secure, easy-to-use and cost-effective manner available.”

Leave a Reply