<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>NetStumbler</title>
	<atom:link href="http://www.netstumbler.com/category/wep/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.netstumbler.com</link>
	<description>The award-winning wireless networking tool and the best source for your daily Wi-Fi, WiMAX, 3G and VoIP news.</description>
	<lastBuildDate>Fri, 19 Sep 2014 17:52:12 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.5.1</generator>
		<item>
		<title>Don&#8217;t Use WEP For Wi-Fi Security, Researchers Say</title>
		<link>http://www.netstumbler.com/2007/04/13/dont-use-wep-for-wi-fi-security-researchers-say/</link>
		<comments>http://www.netstumbler.com/2007/04/13/dont-use-wep-for-wi-fi-security-researchers-say/#comments</comments>
		<pubDate>Fri, 13 Apr 2007 09:02:00 +0000</pubDate>
		<dc:creator>Kristin Abraham</dc:creator>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[WEP]]></category>

		<guid isPermaLink="false">http://www.netstumbler.com:8080/?p=7</guid>
		<description><![CDATA[If you&#8217;re relying on Wired Equivalent Privacy (WEP) protocol for Wi-Fi security you may be at risk. Three German security researchers have found a way to tap into WEP protected data within a minute. Previosly, WEP had been criticized for flaws in the basic algorithm structure but cracking into the system took several minutes. Now, [...]]]></description>
				<content:encoded><![CDATA[<p>If you&#8217;re relying on Wired Equivalent Privacy (WEP) protocol for Wi-Fi security you may be at risk. Three German security researchers have found a way to tap into WEP protected data within a minute. Previosly, WEP had been criticized for flaws in the basic algorithm structure but cracking into the system took several minutes. Now, with the help of a 1.7 GHz Pentium M processor, WEP is rendered useless in a few seconds. Switching to WPA encryption can take up to a few hours but the switch could protect your private and sensitive data.<br />
Via [<a href="http://www.computerworld.com/action/article.do?command=viewArticleBasic&#038;articleId=9015559">computerworld.com</a>]</p>
]]></content:encoded>
			<wfw:commentRss>http://www.netstumbler.com/2007/04/13/dont-use-wep-for-wi-fi-security-researchers-say/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>New Attack Cracks WEP In Record Time</title>
		<link>http://www.netstumbler.com/2007/04/12/new-attack-cracks-wep-in-record-time/</link>
		<comments>http://www.netstumbler.com/2007/04/12/new-attack-cracks-wep-in-record-time/#comments</comments>
		<pubDate>Thu, 12 Apr 2007 08:12:00 +0000</pubDate>
		<dc:creator>Eliza Villarino</dc:creator>
				<category><![CDATA[Research]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[WEP]]></category>

		<guid isPermaLink="false">http://www.netstumbler.com:8080/?p=9</guid>
		<description><![CDATA[Researchers at the Technische Universitat Darmstadt have found a way to crack 104-bit WEP, a typical security tool for 802.11b/g/n networks. The team used a 1.7GHz Pentium-M machine to compute the success rate of grabbing the key. The attack needs sufficient traffic, so the researchers made the protected network generate packets. At 40,000 packets, the [...]]]></description>
				<content:encoded><![CDATA[<p>Researchers at the Technische Universitat Darmstadt have found a way to crack 104-bit WEP, a typical security tool for 802.11b/g/n networks. The team used a 1.7GHz Pentium-M machine to compute the success rate of grabbing the key. The attack needs sufficient traffic, so the researchers made the protected network generate packets. At 40,000 packets, the probability of extracting the key is at 50 percent. This could go up to 80 percent with an additional 20,000 packets, and rise to 95 percent when traffic involves 95,000 packets. Hitting 95 percent, based on the experiment, would only take 1 minute and 51 seconds. </p>
<p>Because of WEP&#8217;s vulnerabilities, it is recommended that wireless network owners opt for WPA2, which is yet to be cracked by any known cryptographic attacks. The mechanism also provides support for infrastructure and ad-hoc networks, and includes pre-authentication and CCMP encryption features.<br />
Via [<a href="http://arstechnica.com/news.ars/post/20070404-new-attack-cracks-wep-in-record-time.html">arstechnica.com</a>]</p>
]]></content:encoded>
			<wfw:commentRss>http://www.netstumbler.com/2007/04/12/new-attack-cracks-wep-in-record-time/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
