Contact us today!
(518) 203-2110

Evolve IT

Evolve IT has been serving the Saratoga Springs area since 1995, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

ALERT: Major Wi-Fi Vulnerability Discovered - What You Should Know

ALERT: Major Wi-Fi Vulnerability Discovered - What You Should Know

A major vulnerability has been discovered that affects everyone that uses Wi-Fi. Key Reinstallation Attack, or KRACK, affects the core encryption protocol that most Wi-Fi users depend upon to shield their browsing from others, Wi-Fi Protected Access 2 (WPA2).

WPA2 has been the standard for securing a Wi-Fi access point, especially for businesses. However, WPA2 has a newly discovered flaw that allows a cybercriminal to reuse the encryption keys that are generated when a device and a router connect, which in turn allows them to intercept the data being communicated between the router and the device. This data could include credit card numbers, passwords, and any other information one would input online. Some networks could even allow data to be introduced from outside, for example, a website being infected with ransomware.

Details about the vulnerability will be released on November 1st, which means there is potential that they will fall into the wrong hands if they haven’t already. This gives businesses about two weeks to make sure they are prepared.

Currently, the biggest Achilles’ heel is on the client-side, which means the computers, laptops, and mobile devices are the first priority to update, but network hardware such as access points and routers are important as well.

Fortunately, Microsoft has already released an update to attend to this vulnerability, and Android devices will be rolling out updates during the coming weeks. Anyone running Windows 10 with automatic updates or has recently installed updates should have the fix. Other devices, including smartphones, tablets, and even your network routers and Wi-Fi access points should also be checked for updates.

How to Tell if Your Business is Safe from the KRACK WPA2 Vulnerability

For businesses, the most straightforward answer is if you are paying someone to monitor and maintain your entire network, they should be checking all devices to make sure they are patched to prevent this vulnerability. If you don’t have an agreement with an IT company such as Evolve IT, or you don’t have someone on staff who is aware and knowledgeable about the potential threats to your network, it’s more than likely this vulnerability exists (along with many others).

If you aren’t sure, reach out to us as soon as possible. Evolve IT can help you keep your network patched and up-to-date. For more information, call us at (518) 203-2110.

Comments

 
No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 29 March 2026
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up!

Free Consultation
 

Tag Cloud

Tip of the Week Security Technology Internet Best Practices Cloud Hackers Privacy Email Productivity Business Malware Software Business Computing User Tips Efficiency Workplace Tips Google Hosted Solutions Computer Microsoft Upgrade Windows 10 IT Support Mobile Devices Innovation Smartphone Hardware Gmail Network Security Ransomware Microsoft Office Office Backup Apps Business Continuity Disaster Recovery Operating System Communication Hacking WiFi The Internet of Things Social Media Facebook Bandwidth Quick Tips Mobile Device Management Money Network Smartphones Firewall Content Filtering Managed Service Provider Cybercrime Outlook Website Wireless Technology Android Apple Employer-Employee Relationship History Two-factor Authentication Best Practice Small Business Phishing Alert App Networking Data storage Mobile Computing communications Data Windows Big Data Safety Experience Unified Threat Management Virtualization Black Market YouTube IP Address Processors End of Support Staffing Office Tips LiFi BYOD Downtime Government Keyboard Passwords Streaming Media Augmented Reality Help Desk Writing Search Disaster User Micrsooft Visible Light Communication Hard Drives Shortcut Business Growth Data Management Remote Computing DDoS Recovery Robot Advertising Society Sports Heating/Cooling Word Google Wallet Spam Retail Information Technology Running Cable Windows 8 Internet of Things Business Management IT Services Managed IT services Hosted Solution Windows XP Artificial Intelligence Documents Competition Tech Support Compliance Presentation Entrepreneur Bluetooth Drones Domains Social Printer Browser Hacker Automation Wireless Memory Virtual Desktop Unified Communications Securty Application Document Management Encryption Customer Service Deep Learning VoIP BDR Law Enforcement SaaS Proactive IT Cortana Vendor Management Router Network Congestion Office 365 Save Money Saving Money Music Analytics Monitors Lithium-ion battery intranet Cryptocurrency Laptop IBM Displays Social Networking Google Docs Education Cleaning Holiday Public Speaking
QR-Code