KRACK Looms Over Wi-Fi's WPA2 Encryption - Android and Linux More Susceptible Targets - P2
This is the second of a two-part insight regarding a brand new spectrum of WPA2 (Wi-Fi Protected Access) encryption vulnerabilities. The acronym KRACK (Key Reinstallation AttaCKs) was used to collectively describe these recent Wi-Fi weaknesses. The previous insight examined the type of vulnerabilities, the method of attack, a simple way that end-users can detect any suspicious activity, and a breakdown of all Wi-Fi connected device shipments for 2017 (estimated at 2.8 billion) which might be vulnerable to this or other replay attacks and manipulation or copying of encryption keys.
To find out more about subscribing:
- Next-Generation Physical Access Control Technologies and Opportunities
- Why Operators Should Reposition as “eSIM Companies”
- TfL Figures Demonstrate the Mobile Potential
- FPC Brings China’s First Biometric Contactless Payment Card: What Does the Future Hold?
- What is The True Cost of Rectifying a Security Flaw/Breach?