How to protect yourself from the KRACK attack
A recent reveal of a serious security flaw in WPA2 protocol shows how vulnerable the latter is allowing attackers within range of a device or access point to intercept passwords, email messages, and other data that is supposed to be encrypted. Sometimes the attackers can even infuse ransomware or other malware into a website a user is visiting.
-
Avoid public WiFi Public Wi-Fi is an easier target for hackers, and public networks are not that well-protected to start with. To stay on the safe side, both public and office networks need to update their systems, and still a good idea would be to stay away from public networks until the issues is resolved.
Use wired connections If you feel like the access points you are using may be vulnerable, try to use wired connection for some time.
Use reliable WEB protocols If you don't have a possibility to use a wired connection, make sure you are using HTTPS, STARTTLS, Secure Shell, or another reliable protocol.
Use VPN for extra encryption Consider adding an extra layer of security with a VPN service. Make sure to choose a reputable VPN provider that you can trust though.
Consider cellular If you have a good cellular data package with enough speed, try using it when possible, especially instead of some public connections. While there can still be issues with this solution, especially on Android 6.0 and later, it is a better way to connect and stay protected from hackers.
Patch your devices Most of tech hardware and software vendors reacted to this breach fast and are providing patches for devices. Don't put off patching your phones, laptops, Wi-Fi base stations, and other gear. Patch asap if you have an iPhone, Mac, or Windows computer. If you have an Android device - an update is soon to come. Some of the Wi-Fi access points also have patches available, so be sure to check for one. Many routers don't update automatically, so go ahead and see if yours can be updated right now. From https://www.netspotapp.com/krack-wifi-vulnerability-wpa2.html
Join the Discussion