Info Advantage Blog

Info Advantage was formed in 1992 for the purpose of specializing in Information Technology consulting, which encompasses business solution development, software development, and platform support from IBM’s midrange to a growing number of Intel based solutions.

KRACK Attacks: New Wi-Fi Vulnerability Found in WPA2 Protocol

KRACK Attacks: New Wi-Fi Vulnerability Found in WPA2 Protocol

Experts are warning Wi-Fi users of a newly discovered vulnerability with the Wi-Fi Protected Access II (WPA2) protocol that can be used against all modern protected Wi-Fi networks. This includes information such as credit card numbers, passwords, emails, photos, chat messages, and more. In addition, a hacker may be able to use the vulnerability to inject ransomware, malware, or other attack methods by injecting and manipulating the data. These are known as key reinstallation attacks, or KRACKs.

The weakness can expose any product that uses the Wi-Fi standard protocols, meaning that the vulnerability isn’t only found in a specific product or implementation. During a study by KU Leuven, researchers found that the vulnerability has already affected products from Android, Linux, Apple, Windows, OpenBSD, MediaTek, Linksys, and more.

According to ArsTechnica, "it works by exploiting a four-way handshake that's used to establish a key for encrypting traffic. During the third step, the key can be resent multiple times. When it's resent in certain ways, a cryptographic nonce can be reused in a way that completely undermines the encryption."

For more information on KRACK attacks, visit https://www.krackattacks.com/ or you can read the in-depth academic paper here: https://papers.mathyvanhoef.com/ccs2017.pdf. You can also contact us at Info Advantage at (585) 257-8710 to learn more about the vulnerabilities that can be threatening your data, and how to protect your business from cybercriminals.

VoIP: Cloud vs On-Site Hosting
Statistics Show Your Employees Might Be Mishandlin...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 24 January 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Support Options

  • Phone Support +

    Speak to a support team member on the phone!

    Phone: (585) 254-8710
    Fax: (585) 254-8766

  • Ticket By Email +

    Send an email to the Help Desk to create a ticket automatically and communicate with your team or any member.

    Submit A Ticket

  • Ticket By Portal +

    Create and manage tickets via our secure online Help Desk Portal. (Members Only Requires login)

    Enter Support Portal

  • 1

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security technology Tip of the Week Privacy Best Practices Current Events malware technology solutions Productivity Hackers cyber attacks Business Management Business practice Ransomware backup cloud Software Innovation Hardware Network Security Mobility Microsoft Office tips Business Computing Efficiency Mobile Devices Windows 10 Business Continuity Computer hardware solutions Disaster Recovery Avoiding Downtime Internet business Quick Tips Flexibility data breach email Social Operating System Education Laptop cyber criminals Wi-Fi Health voip Law Enforcement Mobile Computing phone systems Money Information Technology Saving Money IT Identity Theft Automation IT Services Smartphone Facebook History Antivirus Small Business Upgrade Risk Management servers IT Support Office 365 data Application internet user Communication Passwords Miscellaneous Humor Personal Information cloud capabilities Alert Hosted Solutions BDR byod cars Virtual Reality Apps Wireless Internet Protocol Scalability Workplace Tips Encryption Text Messaging Update Employer-Employee Relationship spam Net worth hardware refreshes How To emails Artificial Intelligence Managed IT Services ecommerce Microsoft Office time Server intel Gadgets threats Managing Stress Cybercrime Router iPhone virtualized servers Government Video Games Recovery holiday Battery Remote Computing Google business continuity plan ATMs HaaS Reputation Point of Sale Password downtime content Virtualization Marketing Automobile Software-based phone systems Legal Search Windows USB End of Support Data recovery Worker Commute VoIP right Instant Messaging Work/Life Balance Internet Exlporer Robot Advertising Hosted Solution Relocation VPN Smartphones Private Cloud Users computer network Social Media Touchpad Telephone Systems Black Market PDF User Tips Telephony Google Drive Entertainment

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name