Wi-Fi everything? In WPA2 detected.

Date:

2017-10-16 14:45:05

Views:

3464

Rating:

1Like 0Dislike

Share:

Wi-Fi everything? In WPA2 detected. Source:

This Sunday has been compromised vulnerabilities of high degree of the Protocol Wi-Fi Protected Access II, aka WPA2, which is used by most wireless users. The vulnerability allows hackers to intercept Wi-Fi traffic between computers and access points. Allows KRACK attack and other nastiness, including the seizure of the connections and malicious injection.

The Exploit KRACK, short for Key Reinstallation Attack became known in the framework of carefully classified research as a result of coordinated disclosure, scheduled for 8 a.m. Monday to East coast time. The Advisory Council of the United States CERT, assembled from hundreds of organizations, described the study as follows:

"US-CERT learned about a few key vulnerabilities in operating on the principle of four-party handshake Protocol security Wi-Fi Protected Access II (WPA2). The consequences of these vulnerabilities include decryption, a packet sniffer, capture, TCP connection, injection HTTP content and more. Keep in mind that the problems at the Protocol level affected most correct implementations of this standard. CERT/CC and researcher K. U. Leuven will publicly disclose these vulnerabilities 16 October 2017".

How the vulnerability works? WPA2 uses a four-way handshake, which creates the encryption key of the traffic. During the third step, the key can be re-reship several times. When resubmissions are a certain way, it is possible to completely undermine encryption.

It is Unlikely that most access points will be able to patch quickly enough, and some of them remain untreated. If exploits bypass WPA2 encryption will indeed be simple and reliable, the hackers will be able to listen to nearby traffic to Wi-Fi.

Good, we need to avoid using Wi-Fi until you put the patch. Until then have to use HTTPS, STARTTLS, Secure Shell and other reliable protocols to encrypt traffic on the web and e-mail. Will also have to carefully choose VPN providers.

Recommended

And you can? SpaceX has released a real simulation of Crew Dragon docks with ISS

And you can? SpaceX has released a real simulation of Crew Dragon docks with ISS

this month a new spacecraft from SpaceX Crew Dragon will deliver its first passengers to the International space station. How will this happen? Now you can see what the astronauts see when approaching the ISS. SpaceX has released the real online simu...

What the company will definitely survive the pandemic?

What the company will definitely survive the pandemic?

In the world in the midst of a pandemic coronavirus, which has already affected millions of people. And I'm not talking only about those who were infected, but also about those who have lost a job, got laid wages or even can no longer conduct busines...

Will we be able to survive without the Internet?

Will we be able to survive without the Internet?

do you think we are still the ones who roamed the earth thousands of years, or we become a new society — society ONLINE? Almost like in the cult movie the Matrix. I have long thought that we are very dependent on the Internet, but wonder how. L...

Comments (0)

This article has no comment, be the first!

Add comment

Related News

The Network found an endless archive of death

The Network found an endless archive of death

the Number of computer viruses is constantly growing. Every day there are new kinds of "digital plague", affecting hundreds of thousands of PCs worldwide. As a rule, viruses, aimed at obtaining benefits — the theft of passwo...

Twitter has increased the maximum size of messages to 280 characters

Twitter has increased the maximum size of messages to 280 characters

it would Seem that such a small thing: increase maximum allowable size of messages on the social network from 140 characters to 280. And the Internet from the news happily buzzed and instantly was filled with joking about this, no...

Underwater communication cable of the new generation was launched

Underwater communication cable of the new generation was launched

hundreds of connecting all the continents of the world except Antarctica. They ensure the uninterrupted transmission of large amounts of data from servers of popular services and sites in the apartments of users in different parts...

Pavel Durov: Apple and Google should create their own state

Pavel Durov: Apple and Google should create their own state

the Creator of the popular social networks and is rapidly gaining popularity of the messenger Telegram Pavel Durov recently often becomes a hero the news reports. Not long ago, hundreds of media excitedly discussed his adamant sta...

The Chinese supercomputer has created the greatest model of the Universe

The Chinese supercomputer has created the greatest model of the Universe

the world's Most powerful supercomputer Sunway TaihuLight was launched in China last summer. Entering it into operation, Chinese experts spared developers from other countries, but because of its computing power scientists are mak...

The first module of cloud technologies in Siberia

The first module of cloud technologies in Siberia

the Discovery of a large data center can not remain unnoticed if it takes place in Moscow and St. Petersburg, but if this is just the beginning of a larger project that is being implemented in Eastern Siberia, it is of even more i...

Facebook launch messenger for kids

Facebook launch messenger for kids

security Issues in world wide web relate not only to protect against viruses and other malware, but also address the issues of protection of children from inappropriate content. And if conventional hosting sites or business more o...

Computers, many countries were attacked virus-the extortioner

Computers, many countries were attacked virus-the extortioner

Today, the Network began to appear reports that in the internal computer system of the Ministry of interior raging virus ransomware, encrypting data and demanding money for decryption. If you do not buy «pick» at the app...

National search engine

National search engine "Sputnik" has not met expectations

Newspaper «sheet» , created in 2014, the Russian search engine «Satellite» going to close or fundamentally change, adapting it for other tasks. According to the source Newspapers, a national search engine has g...

Where it is fashionable to meet in 2017?

Where it is fashionable to meet in 2017?

the yard is almost summer, and you sit at home, hrumkayut chips and read endless longreads about Elon musk? It's time to go outside, take a walk and find a mate that will brighten your evening, to cook borsch and to wash socks. No...

SpaceX will launch Internet satellites this year

SpaceX will launch Internet satellites this year

that SpaceX plans to launch satellites for Internet, company representatives said at a meeting in the us Senate. It is planned to put into orbit more than four thousand units, which will help to ensure broadband Internet is not on...

The Creator of Wikipedia has launched its new project

The Creator of Wikipedia has launched its new project

we All know Jimmy Wales, the man who in 2001 created a free online encyclopedia called . For sixteen years this project has become so that today they are used daily by hundreds of millions of people from dozens of countries. Even ...

Not only to traders: mobile application Alpari Mobile

Not only to traders: mobile application Alpari Mobile

to Monitor the market and is useful to many, even if you are not a professional trader or investor. Some do it for Hobbies, others are just interesting to observe the economic situation in the country and the world (taking into ac...

Delight yourself with updated app Hi-News.ru!

Delight yourself with updated app Hi-News.ru!

the Website Hi-News.ru is not only quality and interesting content on science and high technologies, but also an excellent iPhone and iPad app. The app, which is the object of our special pride, continuously improving and this wee...

"Misty" storage can be a safe alternative to cloud-based

Working in the field of computer technologies Italian scientists create a new concept of remote distributed storage of documents, where the benefits of cloud computing would remain the same, but without the attendant security flaw...

Google has figured out how to make reCAPTCHA invisible

Google has figured out how to make reCAPTCHA invisible

to Be a robot in our days is becoming increasingly difficult. The ingenious developers of websites and web services to create more sophisticated checks on the activities of bots in the Network. If before we were forced to introduc...

Qutee.com — artificial intelligence in the service of marketing

Qutee.com — artificial intelligence in the service of marketing

In the era of "posttrade" it is believed that what we love, what they believe and what they want — all this is imposed on us from outside. PR people, marketers, spin doctors, advertisers — all of these people relentles...

AI from Facebook will determine suicidal users

AI from Facebook will determine suicidal users

according to the BBC news service, social network Facebook has developed algorithms for artificial intelligence are capable of, based on specific behavioral reactions and communication styles of people, find the users who are in v...

Social networks and messengers in a single app? No longer a dream

Social networks and messengers in a single app? No longer a dream

not long ago it was fashionable to have dozens of different applications that essentially could be combined into one, now the trend is back — instead of separation it's aggregation. This time to combine will be the most impo...

Wikipedia broke real hidden cyber war between the bots

Wikipedia broke real hidden cyber war between the bots

Wikipedia is one of the most popular websites on the Internet (according to itself, Wikipedia, reference data Alexa Internet and SimilarWeb). On the running in 2001, the website to date contains more than 40 million articles on va...