The majority of devices at home and business today have wireless capabilities. There are a few options to keep your business/home wireless networks safe. PEAP and LEAP attacks are available, but pricier. Protected Extensible Authentication Protocol (PEAP), is a protocol that encapsulates the Extensible Authentication Protocol (EAP) within an encrypted and authenticated Transport Layer Security (TLS). http://searchsecurity.techtarget.com/definition/PEAP-Protected-Extensible-Authentication-Protocol Lightweight Extensible Authentication Protocol (LEAP) is a Cisco-proprietary version of EAP, the authentication protocol used in wireless networks and Point-to-Point connections. http://searchsecurity.techtarget.com/definition/LEAP-Lightweight-Extensible-Authentication-Protocol There are also programs such as Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access II (WPA2). These security protocols and security certification programs were developed by the Wi-Fi Alliance to secure wireless computer networks.
A longer password is always harder to crack. Rainbow Tables are a pre-computed table for reversing cryptographic hash functions, usually for cracking password hashes. These are used to break into WPA and WPAII security methods.
Hash is an algorithm that turns a variable amount of text into a small, fixed-length value called a “hash value” or “hash code”.
Most importantly, always report or shut down rogue access points.
Tune in next week for more of the latest news in cybersecurity!