Connect with us

Hi, what are you looking for?

Security

A Belgian security researcher discovered flaws in Wi-Fi compatible devices that could affect all products since the 1990s

A Belgian security researcher discovered flaws in Wi-Fi compatible devices that could affect all products since the 1990s

A security researcher recently discovered a Wi-Fi vulnerability that could appear in any Wi-Fi-compatible device created in 1997. Although this seems worrying, especially in a world where almost everything in the world is connected to the Internet, there is nothing to do. According to the findings of the researchers, the actual risk associated with exploiting this vulnerability is small. Most importantly, users can easily protect themselves from the same attacks.

However, if the operation is correct, it may cause errors and cause Wi-Fi-connected objects to be monitored. It may even lead to the extraction of sensitive user data from personal devices such as laptops and mobile phones. But what is vulnerability? Who discovered the vulnerability? If you are familiar with the topic of network security (perhaps a niche market), the name Maty Vanhoef may sound familiar. He is a well-known security researcher in Belgium and has done an excellent job in cybersecurity. Vanhoef is particularly known for discovering Wi-Fi vulnerabilities and errors.

The last vulnerability he discovered even affected WPA3 (WiFi Protected Access 3), which is the latest security certificate ever issued. The vulnerabilities are given the generic name FragAttacks, and if the user is in the three to three range, these vulnerabilities can be exploited. In fact, they manifest themselves in the form of design flaws inherent in the current Wi-Fi standard. The remaining reasons are due to errors found on various Wi-Fi devices that make them unprotected.

Therefore, some of these shortcomings can be traced back to the predecessor of the WPA program, Wired Equivalent Privacy (WEP). As a result, equipment manufactured in 1997 may also be in danger. The full video is written by Mathy Vanhoef and discusses the more specific complexities of FragAttacks and how they work and how to use them. However, it also provides users with a lot of protection: due to these shortcomings, only ensuring that they visit HTTPS websites or rely on VPN to browse the Internet can obtain almost complete security. To be honest, users have increased their vigilance these days and have taken this precautionary measure in the first place.

A Belgian security researcher discovered flaws in Wi-Fi compatible devices that could affect all products since the 1990s

credit: Digital Information World

LAST THOUGHTS:

Although this seems worrying, especially in a world where almost everything in the world is connected to the Internet, there is nothing to do. According to the findings of the researchers, the actual risk associated with exploiting this vulnerability is small. The vulnerabilities are given the generic name FragAttacks, and if the user is in the three to three range, these vulnerabilities can be exploited.

Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

You May Also Like

Apps

Despite the technology giant Apple, which claims that its products and services have no advertisements, there is still room for these advertisements in the...

Apps

All YouTube users who create content on the YouTube channel have an introduction line, word, or phrase at the beginning of each video. This...

Apps

Instagram is one of the most popular social media platforms in the social media world because it has a large user base. Recognizing that...

Apps

YouTube is the largest online video platform and the world’s second-largest search giant after Google, with approximately 2 billion monthly active users. One in...