The WPA2 protocol has been violated. Compromised WIFI security.
The WPA2 protocol has been violated. Compromised WIFI security.
They have appeared a few hours ago, news about a series of errors in the core of the WPA2 protocol that could expose the connections that are made through your Wifi . The Wi-Fi protocol WPA2 It is one of the most common and used in the world. This would be a big problem at all levels, from individuals to companies.What does this mean?
This allows an attacker to "eavesdrop" on the traffic that passes between computers and access points using an attack designed to exploit them. It's called KRACK, short for Key Reinstallation Attacks, and it works by exploiting the "four-way handshake" of WPA2. Take advantage of the four-way handshake that is used the first time you connect to a network with a network Wifi , and through which the keys with which your traffic is encrypted are established.How can it affect me?
First, the attacker must be in range of the WiFi network since it is not a remote attack. An attacker who is physically close to your network, access point or router could steal your password from Wifi , check your activity on the Internet, intercept connections without encryption. If someone wants to exploit this vulnerability it has to be physically close to your computer , so any Internet cracker will not be able to enter it. And even if you do, you can only access information that is unprotected on your network. And it is that there is much other private information that does not delegate in the protocols of WPA2 . For example, every time you enter an HTTPS-protected website, your browser "negotiates" a separate encryption layer. This means that although you Wifi is compromised, the information you exchange with secure websites will continue to be protected. In any case, it is still a serious problem. These vulnerabilities could disrupt existing communications within a network. More details will be released in a few hours.Share this post
Publications
related
User protection Don’t let it keep you awake at night!
In today's hyper-connected world, we need a proactive and dynamic zero-trust security approach that adapts to the evolving threat landscape and the increasing complexity of modern IT environments without slowing down your organizational innovation. The user protection suite that Solutel provides, as an expert in cybersecurity solutions, protects against all...
Why is observability important in cybersecurity? Splunk and CISCO
In today's hyper-connected world, data is everywhere and all organizations rely on it to manage their business and make critical decisions every day. Factor in the acceleration and adoption of generative AI, expanding threat surfaces and multiple cloud environments, and you create a level of complexity unlike anything organizations have faced....
Cisco XDR helps quickly detect advanced cyberthreats and automate response
With unique visibility across the network and endpoints, Cisco XDR Extended Detection and Response simplifies security operations and prioritizes and corrects incidents more efficiently. San Francisco (RSA Conference), April 25, 2023. - Cisco has presented during the RSA event its new Extended Detection and Response (XDR) solution and advanced features for...
Cisco Secure Firewall 3100 series
The 3100 Series firewalls are designed to make hybrid work and zero trust practical. They support more remote users and increase VPN performance. Clustering and the flexibility of high port density allow the firewall to grow with you, ensuring a solid return on investment. The Cisco Secure Firewall 3100 Series is...