A vulnerability discovered in the WPA2 WiFi security protocol

Nobody or nothing is saved from errors or vulnerabilities and in this case we are facing an important one and that is the WPA2 security protocol used today by all routers, smartphones, computers and other current products are in serious danger after the discovery of this vulnerability.

In this case, none of the current products are saved since this is a security system that works for all current devices, no matter whether it is iOS, macOS, Android or Windows. In addition, the failure discovered by the academic in computer security, Mathy Vanhoef shows that any hacker could calmly see all our web browsing in a simple way.

The WPA2 protocol used to protect most wireless devices and networks. In this case and to verify that this vulnerability exists and may be important for all users, they have developed "KRACK", short for Key Reinstall Attack and that serves to demonstrate that the problem is real and serious. Some communications have already been issued insisting that the results of the investigation of this vulnerability are completely true and therefore it is necessary to correct this security problem as soon as possible.

It's dangerous, but don't panic

The first thing to note is that this security flaw allows the registration of all content and therefore it is about "spying" on the traffic on the network. And on the other hand, we must warn that we are facing a problem that will be solved soon by means of a security patch that will be released to all devices automatically, routers and other products included, so calm down. However, it is good to check from time to time the connections to the network of our router to see especially those that send data.

It is also interesting to note that in order to access this vulnerability physical access is necessary on our computer, smartphone, tablet, etc, so it is difficult for it to affect us. If this happens, it may be used to decrypt network traffic, put content in our normal traffic and obtain personal data from connections in which we need to log in with a username and password.


Follow us on Google News

Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: AB Internet Networks 2008 SL
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.