D-Link routers are vulnerable to hackersD-Link, the mega networking manufacturer, has issued an alert for some of its Internet routers. Its routers are used widely, with many Internet Service Providers sending them out to customers so they can get online.

 

 

 

Apparently the routers in question can be compromised following the discovery of a back door that could let hackers take remote control of the routers. In short, someone could use the vulnerability to log into computers connected to the routers without any password or authentication. You can imagine the damage that could be done not least in terms of online identity theft.

D-Link routers: widespread and common

Because D-Link routers are so widespread and commonly used its worth checking to see whether you’ve got one. Apparently, the affected models are quite old, however, given that routers tend to be installed and then forgotten there could be plenty still in use.  The affected models are: DI-524, DI-524UP, DIR-100, DIR-120, DI-604UP, DI-604+, DI-624S and TM-G5240.

D-Link has issued a series of updated and patches for the affected routers and also some general advice about unsolicited e-mails that relate to security vulnerabilities. It warns that if you click on links in such e-mails, it could allow unauthorised persons to access your router.

To get the latest information and patches for these routers click here, it will take you through to the D-Link page where you can access the patches and also get further information.

Identity theft protection

That said the highly-regarded security researcher, Brian Krebs, reckons updating routers can be a tricky business. Because of that, and a few other reasons, he suggests upgrading the routers to newer devices such as those made by Asus, Linksys and Buffalo. You can get the rationale behind this thinking by checking this link. You’ll also get some more information on the D-Link breach.

This is just the latest in a seemingly never ending tide of online threats. While it may not be exploited by hackers at large, there will undoubtedly be some who are keen to test their skills and see how deep they can get into someone’s network or computer. If anything, this potential exploit illustrates just how important it is to have good identity theft protection in place.

Posted by Steve Bell

Written by Steve Bell (107 Posts)

Steve has a background in IT and business journalism and in the past has written extensively for both the UK national and trade press including The Guardian, Independent-on-Sunday, The Times, The Register, MicroScope and Computer Weekly. He's also worked for most of the world's largest IT companies in a copy and content producing capacity. He has a particular focus on IT security and has been involved in writing about the industry at various levels ranging from magazine launches to producing newsletters. He also runs a small copy writing business called Art of Words. When not bashing away at a keyboard he can sometimes be found in a boxing gym making futile efforts to keep fit or marveling at the works of Sufi poets such as Jalaluddin Rumi and Hafiz of Shiraz.


Leave a Reply


*