Newly discovered Wi-Fi security protocol vulnerability leaves most consumers' traffic open to eavesdropping

2comments

The Wi-Fi Protected Access II protocol - the de-facto standard for consumer Wi-Fi security - is vulnerable to an attack that allows malicious hackers to eavesdrop on Wi-Fi traffic.

The exploit is called KRACK, short for Key Reinstallation Attacks, and it works by affecting the four-way handshake used to establish a key for traffic encryption. The attack happens at the third step of the process when a key can be resent multiple times and when resent in a certain way, a cryptographic nonce can be reused so that the whole security operation is compromised.


Recommended For You

The whole research around the KRACK has been kept a secret in the past weeks, right before the scheduled public announcement at 8am ET on Monday.

Some companies like Aruba and Ubiquiti that sell wireless access points (WAPs) to the government and other large parties have already updates that patch this exploit, but the overwhelming majority of WAPs will be patched much later, and many will not be patched at all.

With this in mind, HTTP website traffic becomes exposed, but you can still have a secure browsing experience if you visit HTTPS only websites.

source: Ars Technica

Holiday special: Iconic Phones is now 10% off!

Our new coffee table book, Iconic Phones, is a stunning visual tribute to the legends in the world of phones, featuring exclusive high-resolution photography, stories, quotes and fun trivia. Save 10% by using this code at checkout: XMAS10. Offer lasts until 1 January 2026.
Shop Now
Google News Follow
Follow us on Google News

Recommended For You

COMMENTS (2)

Latest Discussions

by 30zpark • 3
FCC OKs Cingular\'s purchase of AT&T Wireless