Krack Attacks: How Can You Protect Yourself?

All Wi-Fi networks are hackable since the WPA2 encryption was broken. The WPA2 protocol, developed in 2004 after the crack of the WEP protocol, was until today the most reliable in terms of information encryption. Its role is true to secure data exchanges between a Wi-Fi access point and a connected device, whatever it is.

The Vulnerable WPA2 Protocol

The researchers who discovered the flaw called Krack Attacks in the WPA2 protocol specify that it is located at the level of the automated negotiation process (“4-way handshake”) of WPA2 and would allow a nearby hacker to decrypt the flows, to analyze all our actions or recover our data (” man in the middle “).

All Internet users around the world using Wi-Fi networks are therefore concerned.

 Researchers yesterday revealed details of their discovery.

JarnoNiemelä, Lead Researcher for the F-Secure Laboratory explains:

“ Your level of vulnerability depends on several factors such as the type of device you are using, but all Internet users who use Wi-Fi carelessly are a potential target. The security issues associated with Wi-Fi protocols are already well known, but these new attacks add to the long list of design flaws in network security protocols. Internet users must be informed of this. “.

Whatever device you use (iPhone, Mac, PC, Linux computer, etc.) you are concerned about. It is not the devices that are concerned here, but the connection method. If your device can connect to Wi-Fi, you are a target and all your data is in danger (photos, confidential emails, passwords, sent messages, etc.). And even if you think you have nothing to hide, you necessarily have data that you do not want to be made public (at least your bank details for example!).

How To Protect Yourself

Wi-Fi, ubiquitous at home, in the office, with friends, or in public places, is therefore not infallible, even if it is secure.

Wait For Your Router To Update

The most effective way to correct this flaw is to eliminate it. In the coming weeks, updates will be gradually rolled out to most equipment, as patches become available. This fix is ​​usually done automatically by the manufacturer, but you can check in the router settings if a firmware update is offered. At Nordnet for example, your equipment is already protected from this flaw without you having to do anything!

In the meantime, the tips below will help you deal with the emergency.

Use a VPN

We strongly recommend that you equip yourself with a secure VPN (a virtual private network): an alternative encryption technique that secures your network and encrypts your data. Security Freedom, for example, encrypts all your data in transit and protects you from all the dangers of Wi-Fi networks. It is particularly useful for connecting in public places, where Wi-Fi networks are not secure. But regardless of the network used, secure or not, with Krack Attacks we now know that they are all hackable. So whether you are at a friend’s house, in a hotel, in a cafe, or even at home, the VPN is the only tool that can guarantee the security of your network.

Make Your Update

If a hacker manages to hack your router, they do so and then attack your connected devices. Update your software and operating systems as often as possible, on your computers as well as on your tablets and smartphones.

Use An RJ45 Cable At Home

When you are at home, you can connect your computer to your wired box using an RJ45 cable instead of using Wi-Fi.

In any case, do not revert to an older generation protocol such as WEP, which is a version before WPA2 and therefore more vulnerable.

Also Read:

  1. The Prior Considerations for Mobile App Development
  2. Hidden Security Risks of Remote Work and How to overcome them

Amelia James

I'm Amelia James, I am an experienced professional in the field of VPN, especially in Circuit VPN product classification, I write the content in this regard to clear the queries of people facing issues in getting a VPN. I also guide people in this regard as I carry out regular research to stay updated with the guidelines, policies, and the procedure for the VPN.

Related Articles

Check Also