• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH
Network Security

KRACK Exploit Puts All Devices on WiFi at Risk

Researchers have discovered that all devices on a WiFi network using the WPA2 security protocol are vulnerable to newly discovered KRACK exploit.

October 24, 2017 TechDecisions Staff 1 Comment

By now you may have heard of the latest cybersecurity threat, KRACK (short for Key Reinstallation AttaCK). But what exactly is it?

KRACK is a vulnerability in the WPA2 security protocol used by most wireless networks today. The vulnerability allows hackers to steal data flowing between your wireless device and the targeted WiFi network, as well as potentially inject malicious data and ransomware, according to Krebs on Security.

SSI reached out to cybersecurity expert and CEO of Trustifi Idan Udi Edry to explain what it all means and how we can keep our information safe. Here’s what he had to say:

The cyber “flaw” we’re seeing now is one that impacts people outside of just the business world, and outside of just those that use a specific email server. It instead, impacts every consumer who operates under Wi-Fi, within a WPA2 security protocol.

As you are reading this, you may be vulnerable…

The bug currently nicknamed KRACK, is simply a “glitch” in the system, which has the potential to allow hackers into network traffic, and have access to any personal information that is sent over a WiFi connection.

When we think wireless, we often think phones, however think of everything we send, do, and share over a WiFi network.

According to Tech Insider, in 2016, WiFi accounted for the larger share of data sent from smartphones, and that just accounted for handheld devices linked to a carrier.

When we look at how to move forward from a vulnerability like this, we must be proactive in protecting our private information, and in understanding the responsibility for this “flaw” in security falls into the hands of the security protocol system.

Without careful implementation of proper security features, billions of consumers’ information is now at risk.

One of the problems that we are facing at the moment is that all of the information on our phones and computers is actually being held in one basket, which causes a very big vulnerability for our privacy.

We wouldn’t give our phone lock code passwords to a complete stranger, or better yet, our email passwords. However, without any level, or extra level of security, this is essentially what we are handing over. When a breach of this magnitude surfaces, we become vulnerable and are immediately at risk of losing our privacy, without an extra level of security in play.

We at Trustifi try to increase our customer’s awareness of how important it is to secure your information and especially that information that is sent over on one of the leading communication platforms today – email. We cannot prevent delivering of information via email, because it has become part of our life.

However, how we deliver it, we can control. I suggest everyone puts as many factors of authentication on their email accounts, and encourage every business that is sending them information, to do the same.

Sending over bank statements, medical documents, criminal records, etc., with a simple password protected landing page, is simply not enough. Two-factor authentication can prevent these cyber breach breaking news stories from surfacing on a daily basis.

Consumers need to wake up, put pressure on those businesses that they do business with, and understand cybersecurity is no longer a question of “should we,” but rather, “How do we?”

If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our digital newsletters!

Tagged With: Cyber Attacks, Malware Protection, Malware Removal

Related Content:

  • Cybersecurity and information or network protection. Future technology web services for business and internet project CrowdStrike Cyber Armageddon: How Do Firms Now Build…
  • DDoS, NETSCOUT Arbor Insight 7 Layers of DDoS Attacks and How To…
  • cisco webex-rooms-modern-space AVI-SPL Receives Cisco 2023 Reimagine Workspaces Partner of…
  • data breach Nearly 900 Schools Impacted by National Student Clearinghouse…

Free downloadable guide you may like:

  • Download TechDecisions' Blueprint Series report on Security Awareness now!Blueprint Series: Why Your Security Awareness Program is Probably Falling Short

    Learn about the evolution of phishing attacks and best practices for security awareness programs to ensure your organization is properly prepared to defend against them in this report from TechDecisions' Blueprint Series.

Reader Interactions

Comments

  1. اسعار التكييفات , فلاتر مياه , صيانة تكييف says

    February 5, 2018 at 7:00 pm

    water filters,

    Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest Downloads

Practical Design Guide for Office Spaces
Practical Design Guide for Office Spaces

Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-fa...

New Camera Can Transform Your Live Production Workflow
New Camera System Can Transform Your Live Production Workflow

Sony's HXC-FZ90 studio camera system combines flexibility and exceptional image quality with entry-level pricing.

Creating Great User Experience and Ultimate Flexibility with Clickshare

Working and collaborating in any office environment today should be meaningful, as workers today go to office for very specific reasons. When desig...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.