41 percent of Android phones are vulnerable to 'devastating' Wi-Fi attack

41 percent of Android phones are vulnerable to 'devastating' Wi-Fi attack

7 years ago
Anonymous $ZOEEBQ1zf0

https://www.theverge.com/2017/10/16/16481252/wi-fi-hack-attack-android-wpa-2-details

A new exploit can allow attackers to read Wi-Fi traffic between devices and wireless access points, and even modify it to inject malware into websites. Researchers have started disclosing security vulnerabilities today, and it looks like Android and Linux-based devices are the worst affected. Researchers claim the attack works against all modern Wi-Fi networks using WPA or WPA 2 encryption, and that the weakness is in the Wi-Fi standard itself so it affects macOS, Windows, iOS, Android, and Linux devices.

Intercepting traffic lets attackers read information that was previously assumed to be safely encrypted, and hackers don’t need to even crack a Wi-Fi password to achieve this. The vulnerability requires that a device be in range to a malicious attacker, and it can be used to steal credit card numbers, passwords, chat messages, photos, emails, and lots of other online communications.

41 percent of Android phones are vulnerable to 'devastating' Wi-Fi attack

Oct 16, 2017, 10:20am UTC
https://www.theverge.com/2017/10/16/16481252/wi-fi-hack-attack-android-wpa-2-details >A new exploit can allow attackers to read Wi-Fi traffic between devices and wireless access points, and even modify it to inject malware into websites. Researchers have started disclosing security vulnerabilities today, and it looks like Android and Linux-based devices are the worst affected. Researchers claim the attack works against all modern Wi-Fi networks using WPA or WPA 2 encryption, and that the weakness is in the Wi-Fi standard itself so it affects macOS, Windows, iOS, Android, and Linux devices. >Intercepting traffic lets attackers read information that was previously assumed to be safely encrypted, and hackers don’t need to even crack a Wi-Fi password to achieve this. The vulnerability requires that a device be in range to a malicious attacker, and it can be used to steal credit card numbers, passwords, chat messages, photos, emails, and lots of other online communications.