Explore the latest news and trends  

Sign up for our weekly security newsletter


Be the first to receive important updates on security





Send

Wireless Network Cards, Tool of Choice for Hackers

While prepaid wireless network cards are convenient for users to access Internet anywhere, it can result in fraudulent activity when in wrong hands. In this way, the tool can invite "wireless hackers" who are increasing in numbers.

Prepaid wireless network cards leave no evidence of the user, so it is an instrument of preference for cyber perpetrators who can slip past undetected. These cards work by inserting them into ports or computer systems enabling wireless access at any place where PHS or cell-phones are available.

The prepaid wireless cards are there for sale with different kinds of Internet access plans that can fulfill a user's requirements. The card includes fees for Internet access and communication for a specified time period. Since they require no billing these are problem-free. For this reason some distributors do not ask retailers for ID checks.

The National Police Agency (NPA) of Japan said wireless card crimes started emerging during 2004-2006. In 2005, Japanese police arrested criminals across the nation or helped prosecutors with information regarding 271 unauthorized Internet access incidents. Of these numbers of cases, 28 related to prepaid cards. In incidents, which involved the use of prepaid cards, but the retailer did not have record of customer IDs, it is possible to reach the card only when applied in a wireless assault. However, this will not help to get to the hacker since no Internet service contact record is included in this.

The NPA said that in 2005, they knew about 592 unlawful access cases through complaints lodged or lawsuits filed. But in May 2006, investigators gradually closed probing in 31 prepaid cards crime cases. However, they were able to crack some cases by sincerely and relentlessly tracking those cyber crimes.

Recently Times Online found clues into the use of the "evil twin attack" technique by criminals. In this, victims in a café think they are connected to a genuine network while in fact, they are put to a 'bogus' connection. The hacker does this by establishing a false Wi-Fi connection on his laptop by some simple programming and using a USB drive to serve as the access point.

Related article: Wireless Technology behind Highest Customer Data Breach

» SPAMfighter News - 5/24/2007

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Dear Reader

We are happy to see you are reading our IT Security News.

We do believe, that the foundation for a good work environment starts with fast, secure and high performing computers. If you agree, then you should take a look at our Business Solutions to Spam Filter & Antivirus for even the latest version of Exchange Servers - your colleagues will appreciate it!

Go back to previous page
Next