Top Wi-Fi routers easy to hack, says study | Security & Privacy - CNET News
My router's not safe? Really?
"It is not a safe assumption to make that you're safe," Steve Bono, the company's CEO and principal security analyst, told CNET in a phone interview.
The report notes that all 14 of the devices had critical security vulnerabilities that could be exploited by a "remote adversary" and could lead to unauthorized remote control of the router.
Before you dismiss router hacks as exceptionally rare, it's important to note that they've been a small but growing segment of computer security threats. In 2011, one firmware vulnerability affecting six hardware manufacturers combined with two malicious scripts and 40 malicious DNS servers to attack 4.5 million Brazilian DSL modems, with the goal of stealing bank and credit card information.
Wi-Fi routers: More security risks than ever | Security & Privacy - CNET News
Even if your router is not specifically mentioned, it's likely to belong within the same category as the ones used in the report. Follow best practices when securing them. We can't pretty much do anything if it's a firmware vulnerability, but having an attack surface as small as possible still helps.
Quote:
My router's not safe? Really?
"It is not a safe assumption to make that you're safe," Steve Bono, the company's CEO and principal security analyst, told CNET in a phone interview.
The report notes that all 14 of the devices had critical security vulnerabilities that could be exploited by a "remote adversary" and could lead to unauthorized remote control of the router.
Before you dismiss router hacks as exceptionally rare, it's important to note that they've been a small but growing segment of computer security threats. In 2011, one firmware vulnerability affecting six hardware manufacturers combined with two malicious scripts and 40 malicious DNS servers to attack 4.5 million Brazilian DSL modems, with the goal of stealing bank and credit card information.
Even if your router is not specifically mentioned, it's likely to belong within the same category as the ones used in the report. Follow best practices when securing them. We can't pretty much do anything if it's a firmware vulnerability, but having an attack surface as small as possible still helps.