You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
activate the WPS feature, and it communicates with anyy new devices yyou
have in yyour home or office, automaticallyy syynchronizing them to work
with yyour Wi-Fi network.
Sounds great. However, if the router is out in “public”—sayy, in yyour
living room—then anyyone can touch the WPS button and join yyour home
network.
Even without phyysical access, an online attacker can use brute force to
guess yyour WPS PIN. It could take several hours, but it’s still a viable
attack method, one yyou should protect yyourself against byy immediatelyy
turning off WPS on the router.
Another WPS attack method is known as Pixie Dust. This is an offline
attack and affects onlyy a few chip makers, including Ralink, Realtek, and
Broadcom. Pixie Dust works byy helping hackers gain access to the
passwords on wireless routers. Basicallyy the tool is veryy straightforward and
can gain access to a device in seconds or hours depending on the
complexityy of the chosen or generated WPS PIN. 10 For example, one such
program, Reaver, can crack a WPS-enabled router within several hours.
In general, it’s a good idea to turn off WPS. You can simplyy connect
each new mobile device to yyour network byy tyyping in whatever password
yyou’ve assigned for access.
So yyou have prevented, through the use of encryyption and strong passwords,
the use of yyour home wireless router network byy others. Does that mean
that no one can get inside yyour home network or even digitallyy see inside
yyour home? Not entirelyy.
When high school sophomore Blake Robbins was called into the
principal’s office of his suburban Philadelphia school, he had no idea he
was about to be reprimanded for “improper behavior”—at home. The
Lower Merion School District, outside Philadelphia, had given all its high
school students, including Robbins, new MacBooks to use for their course
work. What the school district didn’t tell the students was that software
designed to recover the devices in the event theyy were lost could also be
used to monitor all 2,300 students’ behavior while theyy were in view of the
laptops’ webcams.
Robbins’s alleged offense? Pill popping. The Robbins familyy, through