Livestream with us here at your leisure to discuss building Cyber-secure Distributed Broadband Optical Wireless Multi-MiMo-Mesh Architecture Networks as Infrastructure. Hybrid5G development is nearing completion as we start building Free Space Optical Communications Hybrid5G networks for YOU in 2019. We are expecting crosslinked/downlinked satellites, LEO drones + steerable airborne balloons that link streetlamps to deliver Hybrid5G broadband in towns and municipal areas enabling smart cities.
Thursday, 2 November 2017
More on KRACKS, the WiFi WPA2 attack technique reads info that was previously assumed to be safely encrypted.
The recent discovery of serious weaknesses in WPA2, a protocol that secures all modern protected Wi-Fi networks, has been in the headlines. An attacker within range of a victim can exploit these weaknesses using key reinstallation attacks otherwise known as KRACKs.
Concretely, any attacker can use this novel attack technique to read information that was previously assumed to be safely encrypted. This can be abused to steal sensitive information such as credit card numbers, passwords, chat messages, emails, photos, and so on.
The attack works against all modern protected Wi-Fi networks.
Depending on the network configuration, it is also possible to inject and manipulate data. For example, an attacker might be able to inject ransomware or other malware into websites.
The weaknesses are to be found in the IEEE 802.11 Wi-Fi standard itself, and not in individual products or implementations. Therefore, any correct implementation of WPA2 is likely affected. To prevent the attack, users must urgently update their affected products as soon as security updates become available. If ANY of your devices support Wi-Fi, it is most likely affected.
During initial research, it was discovered that Android, Linux, Apple, Windows, OpenBSD, MediaTek, Linksys, and many others, are all affected by some variant of the attacks.
For more information about specific products, consult the database of CERT/CC, or contact your vendor.