Monday, October 16, 2017

Severe WiFi security flaw puts millions of devices at risk

Here’s how it works. Attackers find a vulnerable WPA2 network, then make a carbon copy of it and impersonate the MAC address, then change the WiFi channel. This new, fake network acts as a “man in the middle,” so when a device attempts to connect to the original network, it can be forced to bypass it and connect to the rogue one. Normally, WPA2 encryption requires a unique key to encrypt each

No comments:

Post a Comment

Featured Post

Hackers Exploiting ProxyLogon and ProxyShell Flaws in Spam Campaigns

Threat actors are exploiting ProxyLogon and ProxyShell exploits in unpatched Microsoft Exchange Servers as part of an ongoing spam campaign

Popular Posts