• Contact Us
  • Advertise
  • Submit PR
Sunday, January 25, 2026
  • Login
  • Register
YNOT
  • Home
  • Industry News
    • Porn Star & Adult Talent News
    • Adult Business News
    • Adult Novelty News
    • Adult Industry Legal News
    • Tech News for Adult Webmasters
    • Video Game News for Adults
    • EU News
  • PR Wire
  • Podcasts
  • Industry Guides
  • Newsletters
No Result
View All Result
  • Home
  • Industry News
    • Porn Star & Adult Talent News
    • Adult Business News
    • Adult Novelty News
    • Adult Industry Legal News
    • Tech News for Adult Webmasters
    • Video Game News for Adults
    • EU News
  • PR Wire
  • Podcasts
  • Industry Guides
  • Newsletters
No Result
View All Result
YNOT
No Result
View All Result
Home Adult Industry News from YNOT Adult Business News

ALL Wi-Fi Networks at Risk for ‘Devastating’ KRACK Attack

Marty O'Brien by Marty O'Brien
October 16, 2017
in Adult Business News
U.K. Fear: ‘MindGeek Will Be Facebook of Age-Verification’
491
SHARES
Share on FacebookShare on Twitter

The flaw is not a bug in devices or the way the protocol was implemented but in the Wi-Fi standard itself. Even correctly implemented WPA2 installations are vulnerable.If you thought Wi-Fi networks protected with the WPA2 protocol were secure, think again. Researchers have identified a flaw in the standard that can allow cybercriminals to decrypt commercial and consumer traffic.

The flaw not only could allow hackers to steal passwords and financial data supposedly encrypted upon transmission, but under the right conditions bad actors could inject malware or manipulate data on the network.

Key re-installation attacks, or KRACK, take place during the four-part “handshake” that is supposed to deliver a fresh, encrypted session every time a device connects to the network. The 14-year-old standard, thought to be hacker-proof, can be subverted by interrupting the handshake during the third step and resetting the encryption key to zero. That unencrypts the session, leaving everything open to prying eyes.

Researchers Mathy Vanhoef and Frank Piessensv of Katholieke Universiteit Leuven (KU Leuven) in Belgium, discovered the problem in a handful of devices in mid-July. Following standard cybersecurity practice, prior to revealing the exploit to the public they alerted manufacturers of the devices they tested so the manufacturers could patch the problem.

However, further sleuthing uncovered an ominous fact: The flaw was not a bug in the devices or the way the protocol was implemented but in the Wi-Fi standard itself. Even correctly implemented WPA2 installations are vulnerable, Vanhoef said.

Piessensv and Vanhoef alerted the United States Computer Emergency Readiness Team (CERT), which began contacting vendors in August. CERT gave manufacturers a six-week lead before disclosing the weakness on Monday.

At the same time, the researchers posted a video demonstrating how they compromised an Android 6.0 smartphone, but all operating systems attached to any unpatched Wi-Fi network are vulnerable, they said.

One security expert, Robert Siciliano, chief executive officer for IDTheftSecurity.com, told NBC News he would be surprised if the flaw hasn’t already been exploited.

“This vulnerability has been in existence, some say, for up to 14 years,” he said, “which means that it’s entirely possible someone has already determined this flaw in the past and has exploited it.”

To ensure the security of your network and devices, check with router and device manufacturers for firmware updates and software patches. Many manufacturers and internet service providers pushed patches to devices during the grace period between discovery and public reveal, but some are still wrestling with the issue.

“I think most manufacturers will have patches soon,” Rudis Bob Rudis, chief data scientist at security data and analytics company Rapid7, told NBC News. “But if you don’t see a patch for your home network equipment in at least a week, you should get a new Wi-Fi access point for your house.”

The other — and potentially better — option: a virtual private network. A quick Google search will turn up all kinds of options ranging in price from free to a few dollars a month. Although hackers may still be able to intercept traffic on a VPN, they won’t be able to crack the encryption.

 

Tags: CERTFrank Piessensvkey re-installation attackKRACKMathy Vanhoefvirtual private networkVPNWi-Fi vulnerabilityWPA2
Share196Tweet123
Marty O'Brien

Marty O'Brien

Raised in the Appalachian Mountains of Kentucky, Marty O'Brien was the first of the O'Brien clan to obtain a college degree. A former sports journalist, O'Brien got a peek at the inner workings of the adult entertainment industry while on an assignment to cover the Los Angeles Lakers. He joined the YNOT editorial team in late 2010 and now specializes in technology , business news and ogling starlets.

Related Posts

Top Features

Analyst: The Witcher 4 Could Top $780 Million in Development and Marketing Costs

January 25, 2026
Adult Industry Legal News

Federal Trade Commission Examines Industry Use of Age-Verification Methods

January 24, 2026
Latest From YNOT

Could Roblox’s facial verification be fooled by makeup? TikTok says yes

January 24, 2026
Latest From YNOT

Microsoft Supplies FBI with BitLocker Encryption Keys in Criminal Investigations

January 24, 2026
Load More

SPONSOR

INDUSTRY EVENTS

Currently Playing

YNOT Summit Model Track: Nerds Dig Sexy Gamers

YNOT Summit Model Track: Nerds Dig Sexy Gamers

01:05:46

YNOT Summit Webmaster Track: Understanding Webcam Business Models

00:51:11

YNOT Summit Model Track: Cam Law 101

01:26:24

SPONSOR

POPULAR NEWS

Analyst: The Witcher 4 Could Top $780 Million in Development and Marketing Costs

January 25, 2026

Federal Trade Commission Examines Industry Use of Age-Verification Methods

January 24, 2026

Could Roblox’s facial verification be fooled by makeup? TikTok says yes

January 24, 2026

Sponsor

YNOT YNOT

QUICK LINKS:

  • About YNOT
  • Terms of Use
  • Privacy Policy
  • Editorial Team
  • Advertise on YNOT
  • Support
  • Contact Us
  • Sitemap

FRIENDS OF YNOT:

  • Best Adult Cams
  • Live Porn
  • Adult Reviews
  • Adult Email Marketing
  • Discounted Porn
  • vr porn sites
  • European Adult Biz Magazine

FRIENDS OF YNOT:

  • Rabbits Reviews
  • XXX Job Interviews
  • Adult Site Broker
  • Femdom
  • Paid Porn Sites
  • Live Sex
  • Cam girl sites

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • 2018 YNOT Cam Awards Official Nominees
  • About YNOT
  • Adult Company Directory – Coming Soon
  • Advertise on YNOT
  • Attending the 2018 YNOT Cam Awards in Hollywood
  • Business Directory
    • Search
    • Submit Listing
    • Submit Listing
    • Submit Listing
    • YNOT Business Directory Submission
  • Claim Listing
  • Complaint Policy
  • Contact Editorial Team
  • DMCA Policy
  • Newsletters
  • Porn News & XXX Industry News
  • Privacy Policy for California Residents
  • Sitemap
  • Sitemap Categories
  • Support
  • YNOT Adult Affiliate Marketing Guide
    • Adult Affiliate Marketing for Beginners: A Basic Guide for Getting Started in 2023
    • Adult Affiliate Marketing Verticals Guide
    • Adult Email Marketing Best Practices
    • Buying Adult Email Lists: Why This is Always a Bad Idea
    • Key Concepts: Adult Affiliate Programs
    • Key Concepts: Adult Email Lists
    • Key Concepts: Landing Pages
    • Key Concepts: Sender Reputation
  • YNOT Cam Awards Nominee Information Page
  • YNOT Magazine: Issue 1, 2018
  • YNOT Party 2016 Austin – Event Page
  • YNOT Policy Regarding Social Media or Private Disputes
  • YNOT Privacy Policy
  • YNOT Terms and Conditions

Copyright © 2026 YNOT Group LLC.

We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.