

What I found wasn’t encouraging,” writes Dan Goodin at Ars Technica.

I was curious how easy it would be to crack these passcodes using the advanced hardware menus and techniques that have become readily available over the past five years. “In theory, these protections prevent hackers and other unauthorized people from accessing wireless networks or even viewing traffic sent over them, but only when end users choose strong passwords. Most WiFi networks are protected by either WPA or WPA2 security protocols. The Pineapple (available from HakShop) is ostensibly being marketed for “penetration testing” on office WiFi security (no questions asked). Relatedly, at our Cloud Summit last November, K2’s Randy Johnston stressed the increased importance of stronger passwords and passwording our smart phones and tablets as well.Įarlier this month Cloud9 execs attended the ABA Tech conference and one of the more provocative presentations was that of John Simek, VP at Sensei Enterprises, who demonstrated the relative ease of cracking most office WiFi security using a $99 device called the Pineapple Mark IV to identify local WiFi networks and their weaknesses.Īs reported in ABA Journal, Simek noted that, using the device at home, he was able to track Internet activities of his neighbor who works for a security firm hired by the federal government.

And one of the areas where passwords are the weakest are the standard issue office and home WiFi networks now universally ubiquitous. Use a weak password and the outcome could be disastrous. Passwords are the keys that secure virtually everything nowadays. A recent article in Ars Technica rekindled a healthy nerve with many professionals and business owners regarding general password and office WiFi security…
