London Warbiking Reveals Worrying State of Wireless Security

April 30, 2014 Sophos Press Release

London – April 30, 2014 – IT security company Sophos this week highlighted the worrying state of wireless security in the UK’s capital city, when it sent security expert James Lyne and his computer-equipped bicycle onto the streets of London to test how safe homes, businesses, and even people on mobiles phones are from cyber criminals.

Lyne, Global Head of Security Research at Sophos, went “warbiking” across the city to track down unsecure wireless networks and spotlight user behaviors that could be exploited by rogue hackers, and he discovered some alarming results: “Incredibly, conventional wireless network security is still a major concern, despite the security industry assuming such issues had been resolved years ago. Many would assume these methods are ‘old hat’ but it is still a very viable attack vector that demonstrates basic security best practice is not being adopted.” says Lyne.

“As our London Warbiking exercise found, there are an astonishing number of businesses and home users employing insecure, poorly implemented, or even defunct wireless security protocols. With our voracious hunger to be online at all times, this is leaving millions of people, companies and their valuable data open to attack.”

London was the latest stop on the “World of Warbiking” tour - a global research project targeting major cities across the globe. Conducted over two days around the streets of the capital, Lyne’s warbiking exercise revealed that of 81,743 networks surveyed, some 29.5 percent were using either the known-broken Wired Equivalent Privacy (WEP) algorithm, or no security encryption at all. A further 52 percent of networks were using Wi-Fi Protected Access (WPA) - a no longer recommended security algorithm.

“Even within the security industry there are myths and misunderstanding about what the real risks are with wireless. Many argue that the unencrypted, intentionally open networks (the majority of the 29.5%) are ‘OK’ as they use a captive portal to register users. Unfortunately the standard user doesn’t recognize that major brand XYZ wireless is not encrypted and that their information can be picked up by anyone with £30 piece of equipment available on Amazon,” said Lyne.

Users want the internet and they don’t care where they get it
Just as worrying was many people’s total disregard for basic security. “Our experiment found a disturbingly large number of people willing to connect to an open wireless network we created, without any idea of who owned it or whether it was trustworthy, Compounded by the growing number of devices that are permanently identifying themselves via technology like Bluetooth, this kind of behavior is increasingly putting everyone’s valuable data at risk.”

Lyne continued: “This willingness to connect to any wireless network that professes to offer free wi-fi, without ensuring you have some kind of security measures in place, is like shouting your personal or company information out of the nearest window and being surprised when someone abuses it. With a few extra command line arguments, it would have been trivial to attack nearly everyone in our study.”

What Londoners are connecting to when out and about
The open wireless network created during the London experiment also offered an insight into what people are connecting to when they are out and about. Social media sites such as Facebook and Twitter were high on the list of most requested pages, along with webmail access and news websites. But worryingly, it appears many people are also choosing to access websites and services that could prove even more attractive to cybercriminals:

“Despite the fact that this was an open network, once connected many people seemed happy to access online banking sites, even though they had no idea who was running the access point. Only a tiny minority (2 percent) actually took responsibility for their own security by using a Virtual Private Network (VPN) or forcing secure web standards.

“Our test was conducted strictly within the confines of the law,” explained Lyne, “but the cyber criminals won't have the same concerns, so our experiment shows why people need to be much more aware of the potential dangers of connecting to open wi-fi networks when they are out and about.”
James Lyne revealed the results of the Warbiking London experiment at the InfoSecurity Europe tradeshow, Earl’s Court, London, between April 29 and May 1. Details about the methodology used and results so far from the World of Warbiking project - along with tips on how to be more secure – are available at

About Sophos
More than 100 million users in 150 countries rely on Sophos’ complete security solutions as the best protection against complex threats and data loss. Simple to deploy, manage, and use, Sophos’ award-winning encryption, endpoint security, web, email, mobile and network security solutions are backed by SophosLabs - a global network of threat intelligence centers.

Sophos is headquartered in Oxford, UK. More information is available at


World of Warbiking London – Headline Results*

Wireless Networks Surveyed:
Total Networks: 81,743

  • WEP networks:  5,179
  • No Encryption: 18,946
  • WPA: 43,510
  • WPA2: 14,108

(WPS:  27,970)

Hotspot Experiment:
SSIDs offered:

  • ‘FreePublicWifi’, ‘Free Internet’, ‘DO NOT CONNECT’

Total Connected Users: 2,907

  • Used HTTPS: 437
  • Used HTTP: 2,901
  • Used Insecure Mail protocols: 317
  • Used a VPN: 58

Most Requested Pages:

  • Facebook
  • Webmail Services (match OWA/Common types)
  • Twitter
  • Requests for Internet Banking Sites (which could have been redirected to non secure copies bypassing the use of https://)
  • News Sites

*A full copy of the London Warbiking findings are available on request