Wireless encryption showing signs of KRACKing?

clock • 3 min read

What is KRACK, and what can you do to counter it?

This Monday, at 8am EST, the cybersecurity industry received its latest shot of adrenaline as researchers revealed high-severity vulnerabilities in the Wi-Fi Protected Access II (WPA2) protocol: vu...

To continue reading this article...

Join Computing

  • Unlimited access to real-time news, analysis and opinion from the technology industry
  • Receive important and breaking news in our daily newsletter
  • Be the first to hear about our events and awards programmes
  • Join live member only interviews with IT leaders at the ‘IT Lounge’; your chance to ask your burning tech questions and have them answered
  • Access to the Computing Delta hub providing market intelligence and research
  • Receive our members-only newsletter with exclusive opinion pieces from senior IT Leaders

Join now

 

Already a Computing member?

Login

You may also like
Next's CISO: Learn from attackers to boost cyber defences

Security

Collaboration, knowledge sharing, agility – there’s a lot that cyber criminals do right

clock 02 May 2024 • 4 min read
University CIO: 'We were owned in 4 hours'

Threats and Risks

And that certainly focused minds, says Salford University’s Mark Wantling

clock 20 March 2024 • 5 min read
NCSC issues guidance for migrating SCADA systems to the cloud

Cloud Computing

SCADA systems are an enticing target for cybercriminals

clock 19 March 2024 • 3 min read

Sign up to our newsletter

The best news, stories, features and photos from the day in one perfectly formed email.

More on Threats and Risks

Russian network found using genAI to spread disinformation

Russian network found using genAI to spread disinformation

CopyCop aims to fuel discord and weaken support for Ukraine

clock 10 May 2024 • 2 min read
'TunnelVision' bug potentially allows snooping on all VPNs

'TunnelVision' bug potentially allows snooping on all VPNs

Operating system features can be manipulated to divert traffic away from encrypted VPN tunnel

clock 08 May 2024 • 3 min read
Bots now account for half of all web activity

Bots now account for half of all web activity

Nearly half of internet traffic is now automated, with malicious bots on the rise

clock 07 May 2024 • 3 min read