WiMax's Small Steps to Security

Sprint Corp. (NYSE: S)'s decision last week to spend $3 billion on a new high-speed wireless network gear catapulted WiMax right into the public eye. But what Sprint didn't talk about -- and is less well understood -- is what security measures will protect users who move over to the broadband wireless network. (See Sprint Goes WiMax.)
Analysts, industry experts, and operators are expecting to see some of the same kinds of attacks undertaken against the older 802.11 WiFi standard used against its younger sibling. "I expect we'll see similar problems with [WiMax] as we've seen with other devices, namely weak management protocols and vulnerable applications -- embedded Web servers, unencrypted access via telnet and SNMP V1 and V2," says ex-Tipping Point security consultant Shawn Merdinger.
Security will become a bigger issue with WiMax and other high-speed wireless services, if enterprise experience with WLAN technologies is any indication. Access and authentication remain key wireless concerns for enterprise buyers and users.
There is, however, an increasing awareness that wireless's weakest link may not be in the security methods used to protect it, but rather in the insecure coding at the software driver level, which can be exploited by clever hackers.
Read the whole story at Dark Reading.
— Dan Jones, Site Editor, Unstrung
Analysts, industry experts, and operators are expecting to see some of the same kinds of attacks undertaken against the older 802.11 WiFi standard used against its younger sibling. "I expect we'll see similar problems with [WiMax] as we've seen with other devices, namely weak management protocols and vulnerable applications -- embedded Web servers, unencrypted access via telnet and SNMP V1 and V2," says ex-Tipping Point security consultant Shawn Merdinger.
Security will become a bigger issue with WiMax and other high-speed wireless services, if enterprise experience with WLAN technologies is any indication. Access and authentication remain key wireless concerns for enterprise buyers and users.
There is, however, an increasing awareness that wireless's weakest link may not be in the security methods used to protect it, but rather in the insecure coding at the software driver level, which can be exploited by clever hackers.
Read the whole story at Dark Reading.
— Dan Jones, Site Editor, Unstrung
EDUCATIONAL RESOURCES
sponsor supplied content
Educational Resources Archive
FEATURED VIDEO
UPCOMING LIVE EVENTS
June 6-8, 2023, Digital Symposium
June 21, 2023, Digital Symposium
December 6-7, 2023, New York City
UPCOMING WEBINARS
May 30, 2023
Maximizing the Potential of 5G with Active Assurance
June 14, 2023
How do We Capture the 6G Experience?
June 14, 2023
The Power of Wholesale Order Automation: How New Advancements in Intercarrier Commerce Can Transform Your Business.
June 20, 2023
5G standalone for breakout growth and efficiency
June 21, 2023
Cable Next-Gen Europe Digital Symposium
June 22, 2023
Next-Gen PON Digital Symposium
Webinar Archive
PARTNER PERSPECTIVES - content from our sponsors
Is The Traditional PayTV Provider Being Squeezed Out?
By Terry Doyle for Enghouse Networks
Huawei Unveils the F5G Premium All-Optical Network, Enabling ISPs to Stride into the High-Growth Era
By Huawei
All Partner Perspectives