Tuesday, October 17, 2017

KRACK Attack Fix Released For Windows And Linux

The internet yesterday was filled with news and reports of WPA2 vulnerabilities, known as KRACK, and as a result of this, there was panic among WiFi owners and internet users. It was gathered that Windows, Apple, Android, Linux, and pretty much every device that uses WPA2 security is vulnerable to Krack. Though the exploit isn't an easy one to carry out, neither is it easy to fix, but the vulnerability itself puts a large number of devices at jeopardy. However, the good news is that Microsoft has already issued a patch to her Windows users.
KRACK Attack Fix Released For Windows And Linux
“Customers who have The Windows Update enabled and have applied the latest security updates are protected automatically. The Security Update Guide was updated on October 16, 2017, to provide full disclosure on this vulnerability in accordance with a multi-vendor coordinated disclosure.” - Microsoft

On the other hand, OpenBSD released a security patch way back in July. Also, as seen on Charged, a security patch is now available for Linux. Debian systems can be updated with the same. Also, security patches for Ubuntu 14.04 and above are out now. The same for Gentoo are also available.

Android OS, being the most open source OS on the planet won't be left out in this attack. As a matter of fact, it'll be safe to assume that Krack will hit Android OS the most. So in line with this developments, Google will be pushing a security update in the coming weeks and It’s very likely that it will debut on Pixel and Nexus phones. Phone manufacturers and OEMs are advised to follow and push out these security patch soonest.

The fact that iOS is the most secure OS isn't of any concern to Krack, and Apple isn't taking any chances. They are already testing security updates for their macOS, iOS, watchOS, and tvOS in their beta versions. And to make our Wi-FI more secure, WiFi Alliance, (which certifies WiFi devices), has released a vulnerability detection tool for its members and said it requires testing for this vulnerability within their global certification lab network.




If You Enjoyed this Post, Kindly take 5 Seconds and Share it With Your Friends on

No comments:

Post a Comment

***We ❤ to hear from you, Tell us Your views and opinion. Please note that comments are always moderated, Abusive comments won't be approved, and spammy comments are deleted automatically