View all newsletters
Receive our newsletter - data, insights and analysis delivered to you
  1. Technology
August 11, 2014

How a smart collar can hack into vulnerable Wi-Fi networks

Cat identifies four routers using broken encryption and another four that had no encryption at all.

By Amy-Jo Crowley

A smart cat collar has detected security failings in dozens of vulnerable Wi-Fi networks that can be accessed with ease.

At this year’s Def Con 22 Hacking Conference in Las Vegas, Gene Bransfield, a security engineer at Tenacity Solutions, explained how he fitted a cat with a digital collar that carries a Spark Core computer chip running on custom-coded firmware.

"The collar contained a GPS device and a cellular component and would track your cats movements throughout the neighbourhood," Bransfield explained on the Def Con website.

Bransfield dubbed the experiment ‘WarKitteh’, a method that involves scouring multiple networks to see how secure they are.

He first tested his $100 collar on a Siamese cat named Coco. After three hours of roaming the neighbourhood, the cat returned with information that revealed four Wi-Fi routers had no security encryption, while another four were using an outdated security system.

Bransfield also told Wired that the concept came to him after he came across a special cat collar with a cellular component and a GPS device that tracked the cat’s movements.

Content from our partners
Why the tech sector must embrace faster, smarter talent recruitment
Sherif Tawfik: The Middle East and Africa are ready to lead on the climate
What to look for in a modern ERP system

"But the result of this cat research was that there were a lot more open and WEP-encrypted hot spots out there than there should be in 2014."

He added that he hopes the experiment will increase the public’s awareness about Wi-Fi security and inform people they should secure their Internet networks.

Topics in this article :
Websites in our network
Select and enter your corporate email address Tech Monitor's research, insight and analysis examines the frontiers of digital transformation to help tech leaders navigate the future. Our Changelog newsletter delivers our best work to your inbox every week.
  • CIO
  • CTO
  • CISO
  • CSO
  • CFO
  • CDO
  • CEO
  • Architect Founder
  • MD
  • Director
  • Manager
  • Other
Visit our privacy policy for more information about our services, how New Statesman Media Group may use, process and share your personal data, including information on your rights in respect of your personal data and how you can unsubscribe from future marketing communications. Our services are intended for corporate subscribers and you warrant that the email address submitted is your corporate email address.
THANK YOU