Wireless Devices Subjected to Risk of Hacks with Wi-Fi Security Flaws
287
![]() 479
![]() 101
![]() |
WiFi technology has become an indispensable part in our everyday lives. It has grown from a promising technology for tech-savvy early adopters to a must have for connected devices of all kind, as most of us are keen to tap into the wireless Internet from our offices and homes. At this point, researchers have revealed that there is a major flaw dubbed Key Reinstallation Attack (Krack) and Wifi connections used everywhere around the world are at risk.
Though modern higher-reliability Wi-Fi networks have their traffic encrypted by a protocol WPA or WPA-2, which protects data as it travels from a computer or smartphone to a router, if exploited, gives the attacker a skeleton key to access any WPA2 network without a password. When a system uses Wifi to connect to a router for instance, it goes through a four-step dialogue, whereby the two devices agree a key to use to secure the data being passed—called handshake. This attack starts by tricking a victim into reinstalling the live key by replaying a modified version of the original handshake. Meanwhile, a number of important set-up values can be reset, which renders certain elements of the encryption in a much weaker phase. Once they are in, they can hijack connections, and inject content into the network traffic stream. The bug represents a complete breakdown of the WPA2 protocol, for both personal and enterprise devices—positioning all the Wifi supported devices at risk.
Windows and the advanced versions of Apple’s iOS are greatly protected from the flaws, according to a researcher. To cite an example, few months back the ransomware attacks locked up computers worldwide, demanding payment from people and companies in return for renewed access to vital information and systems. However, with all these flaws the trend in Wi-Fi dependence is not slowing down, it is rather significantly increasing with greater consumer expectation.
Read Also
Featured Vendor
EDITOR'S PICK
Leverage The Customer's Personal Mobile Interaction Point
By Debra Jensen, CIO, Charlotte Russe
Use Technology to Understand Customer Better
By Phil Jordan, CIO, Telefonica
Staying Connected to Organizational Priorities is Vital...
By Alberto Ruocco, CIO, American Electric Power
IT Competing in a Segmented Marketplace
By Sven Gerjets, SVP-IT, DIRECTV
Fueling Your Business through Insights- Driven...
By Adrian Mebane, VP-Global Ethics & Compliance, The Hershey...
The Next 10 Years in Wireless: A Vision for Enterprise...
By Mike Fitton, Wireless Business Unit Director, Altera
Leveraging Cloud and Big Data to Enable Mobile Work...
By Jim Kaskade, VP and GM, Big Data & Analytics, CSC
By Graham Welch, Director-Cisco Security, Cisco
Cisco Stakes Its Claim on the Data Center -Even Your...
By Michael Watkins, Senior Product Director, Global Knowledge
Cloud Computing- Revolutionizing the Education Industry
By Nelson C. Vincent, EdD, VP for IT and CIO, University of...
4Must-Have Technologies for Metals & Mining
By Sharon Gietl, VP-IT & CIO, The Doe Run Company
Optimized Customer Experience through Technology
By Arnold Leap, CIO, 1-800-Flowers.com
By Gary Barlet, CIO, USPS OIG
Your Next Transportation Management System: TMS 2.0
By Mike Dieter, CTO, Transplace
Connecting People and Technology to Deliver the Best...
By Bill Schimikowski, VP, Customer Experience, Fidelity...
The Exchanges Sector Need to Evolve Technologically
By Kevin Kometer, CIO, CME Group
You better watch out, You better not pout, IOT is...
By John Landwehr, Public Sector CTO, Adobe
Four Cybersecurity Weak Spots You Should Care About When...
By Marc Probst, CIO & VP, Intermountain Healthcare
Change Agents in a Digital Healthcare World: People,...
By Charles Koontz, President & CEO, GE Healthcare IT & Chief...
Revolutionizing Industrial Mining through Smart Tools
By Jeff Bauserman, VP-Information Systems & Technology,...