Monday, May 30, 2016
Search
  
Submit your own News for
inclusion in our Site.
Click here...
Breaking News
Patriot Announces 2TB Ignite SSD
ASUS Presents Zenvolution at Computex 2016
MediaTek Introduces Pump Express 3.0 Battery Charging Solution
New ARM Cortex-A73 Processor Drives Efficiency, Performance For Mobile Designs
Plextor To Showcase Its Gaming Grade SSDs at Computex 2016
Nvidia's GeForce GTX 1080 Launches Wordlwide
Corsair Bulldog PC Is Seeking A Place In Your Living Room
Samsung Galaxy C5 and C7 Released In China
Active Discussions
Which of these DVD media are the best, most durable?
How to back up a PS2 DL game
Copy a protected DVD?
roxio issues with xp pro
Help make DVDInfoPro better with dvdinfomantis!!!
menu making
Optiarc AD-7260S review
cdrw trouble
 Home > News > General Computing > Wi-Fi P...
Last 7 Days News : SU MO TU WE TH FR SA All News

Thursday, December 29, 2011
Wi-Fi Protected Setup Vulnerable Due To Security Flaw


US-CERT has released a vulnerability notice related to a critical flaw in the Wi-Fi Protected standard that opens up routers to attack.

According to the notice, WiFi Protected Setup (WPS) PIN is susceptible to a brute force attack.

WiFi Protected Setup (WPS) is a computing standard created by the WiFi Alliance to ease the setup and securing of a wireless home network. WPS contains an authentication method called "external registrar" that only requires the router's PIN. By design this method is susceptible to brute force attacks against the PIN.

Security researcher Stefan Viehbeck has reported and demostrated that some wireless routers do not implement any kind of lock out policy for brute force attempts. This greatly reduces the time required to perform a successful brute force attack. It has also been reported that some wireless routers resulted in a denial-of-service condition because of the brute force attempt and required a reboot.

An attacker within range of the wireless access point may be able to brute force the WPS PIN and retrieve the password for the wireless network, change the configuration of the access point, or cause a denial of service.

Best practices also recommend only using WPA2 encryption with a strong password, disabling UPnP, and enabling MAC address filtering so only trusted computers and devices can connect to the wireless network.


Previous
Next
Sony PS Vita Sales Stall Despite First Week's Strong Interest        All News        Kindle Sales on fire
Google, Youtube, Facebook, Are Most Visited Websites in 2011     General Computing News      Google Introduces YouTube Slam

Get RSS feed Easy Print E-Mail this Message

Related News
Wi-Fi Alliance Introduces Low power, Long Range Wi-Fi HaLow
New Active Steering IC Maximizes Wireless Throughput
Wi-Fi Aware to Bring Proximity-based Service Discovery to Wi-Fi Devices
Wi-Fi Alliance Enhances Wi-Fi CERTIFIED Wi-Fi Direct
Broadcom Doubles Wi-Fi Speed of Devices
FCC Opens More Spectrum For Faster Wi-Fi
Wi-Fi Alliance Reveals New WiGig CERTIFIED Logo; Wireless USB To Get WiGig Boost
Wi-Fi Alliance Kicks Off 5G Wi-Fi Certification Program
FCC To Increase Spectrum For Faster Wi-Fi
Improvements To IEEE 802.11ad Standard Enable Multi-gigabit Data Throughput
Wi-Fi Alliance To Take Over WiGig Development
Marvell Introduces 802.11ac 4x4 Wireless Chipset

Most Popular News
 
Home | News | All News | Reviews | Articles | Guides | Download | Expert Area | Forum | Site Info
Site best viewed at 1024x768+ - CDRINFO.COM 1998-2016 - All rights reserved -
Privacy policy - Contact Us .