Bloomberg the Company

Bloomberg Anywhere Login

Bloomberg

Connecting decision makers to a dynamic network of information, people and ideas, Bloomberg quickly and accurately delivers business and financial information, news and insight around the world.

Company

Financial Products

Enterprise Products

Media

Customer Support

  • Americas

    +1 212 318 2000

  • Europe, Middle East, & Africa

    +44 20 7330 7500

  • Asia Pacific

    +65 6212 1000

Follow Us

Industry Products

Foiling Wi-Fi Sneaks and Snoops


By Steven H. Wildstrom Q: Reader Jaynant Kumar writes: Your article "Wi-Fi: Pumping up the Volume" in the May 16 issue of BusinessWeek says that if you don't employ WEP/WPA protection, "you may find yourself providing access to your Internet connection, and maybe your data, to the whole neighborhood."How does this happen? If someone is enjoying a free ride on my Wi-Fi connection, can I "hack" his access/ID and cause trouble for him? Or conversely, if I connect to a neighbor's network, am I at risk?

A: If you let your neighbors onto your unsecured Wi-Fi network, you run a couple of risks. The most important: If you haven't properly secured the computers on your home network, a neighbor could gain access to your files. In the worst-case scenario -- unsecured Wi-Fi and Windows file-sharing turned on to allow access to anyone on the network -- everything you have is wide open to anyone within range with a Wi-Fi-equipped computer.

A more remote risk is that a neighbor could use your network to send spam or to hack into other people's networks, and the misdeeds might be traced back to you.

STEALING IS STEALING. Fortunately, you can easily prevent these problems. In addition to enabling Wi-Fi security, you should run firewall software on every machine, even if your network router includes a firewall. And if you enable file sharing, use extreme care in regard to what folders are shared and who has access to them.

Taking advantage of your neighbor's unsecured network without permission is definitely unethical and possibly illegal. In effect, you are stealing service paid for by your neighbor. Admittedly, the risks remain low, because few people pay attention to home network access logs, where the intrusion would readily show up. But just because you can get away with it doesn't mean you should. Using the access to get into a neighbor's computer would almost certainly violate one or more of several state and federal laws. Wildstrom is Technology & You columnist for BusinessWeek. You can contact him at techandyou@businessweek.com


LIMITED-TIME OFFER SUBSCRIBE NOW
 
blog comments powered by Disqus