1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

How to avoid the WPA attack entirely

Discussion in 'News' started by wagnerk, Jan 19, 2009.

  1. wagnerk
    Highly Decorated Member Award

    wagnerk aka kitkatninja Moderator


    How to avoid the WPA attack entirely

    The latest crack in wireless Internet security, specifically, the Wi-Fi Protected Access (WPA) security standard, can threaten the safety of enterprise networks and business-sensitive information or data. Last week we explained how to cope with WPA cracks. Today we explain how to avoid them altogether, and what the difference is between WEP, WPA and WPA2.

    It's been seven years since 802.11's Wired Equivalent Privacy (WEP) was cracked. WEP's first replacement, Wi-Fi Protected Access (WPA), has been required of all new Wi-Fi certified products since late 2003. But last month, reports surfaced about a crack in WPA -- specifically, a new attack against the Message Integrity Check (MIC) used by the Temporal Key Integrity Protocol (TKIP). While this new attack is not a death-knell for wireless local area networks (WLANs) using WPA, it is a note-worthy chip in their armor that you can avoid.

    Read the whole article here.

    Certifications: CITP, PGCert, BSc, HNC, LCGI, PTLLS, MCT, MCITP, MCTS, MCSE, MCSA:M, MCSA, MCDST, MCP, MTA, MCAS, MOS (Master), A+, N+, S+, ACA, VCA, etc... & 2nd Degree Black Belt
    WIP: PGDip


    Share This Page