The upcoming BlackHat conference is going to have a presentation on a tool for 
hacking home routers, which the skriptkiddies eagerly await; and I expect this 
will get lots of play and not a little wild-eyed panickery going on by 
irresponsible "tech" bloggers. 

(Undoubtedly Intego will issue a press release stating "Sky Falls Again! Buy 
Our Umbrellas or Your Mac Will DIEEEE!" bit of FUD about this.)

<http://blogs.forbes.com/firewall/2010/07/13/millions-of-home-routers-vulnerable-to-web-hack/>

I don't know if the exploitation vector depends on the OS of your computer (I 
don't think so), but the simplest main fix it to change the default router 
admin password to something non-obvious and certainly NEVER leave it at the 
default 'admin'. 

(Note 1: This should be a rule for ANY device that ever has a password 
associated with it.)

(Note 2: This is the administrative password for configuring the router itself, 
NOT the WEP or WPA password)

I do not yet know if Apple Airport devices are vulnerable.

-- 
Bruce Johnson
University of Arizona
College of Pharmacy
Information Technology Group

Institutions do not have opinions, merely customs


-- 
You received this message because you are a member of G-Group, a group for 
those using G3, G4, and G5 desktop Macs - with a particular focus on Power Macs.
The list FAQ is at http://lowendmac.com/lists/g-list.shtml and our netiquette 
guide is at http://www.lowendmac.com/lists/netiquette.shtml
To post to this group, send email to [email protected]
For more options, visit this group at http://groups.google.com/group/g3-5-list

Reply via email to