DV Hardware - bringing you the hottest news about processors, graphics cards, Intel, AMD, NVIDIA, hardware and technology!
   Home | News submit | News Archives | Reviews | Articles | Howto's | Advertise
 
DarkVision Hardware - Daily tech news
August 20, 2019 
Main Menu
Home
Info
News archives
Articles
Howto
Reviews
 

Who's Online
There are currently 141 people online.

 

Latest Reviews
Ewin Racing Flash gaming chair
Arctic BioniX F120 and F140 fans
Jaybird Freedom 2 wireless sport headphones
Ewin Racing Champion gaming chair
Zowie P-TF Rough mousepad
Zowie FK mouse
BitFenix Ronin case
Ozone Rage ST headset
 

Follow us
RSS
 

Two more vulnerabilities found in WiFi WPA3

Posted on Monday, August 05 2019 @ 13:51:36 CEST by


WiFi logo
The WiFi Alliance developed WPA3 with better security in mind but it appears this isn't working out as planned as researchers once again found vulnerabilities in the protocol. In April, Mathy Vanhoef and Eyal Ronen discovered five vulnerabilities in WPA3, and now the two security researchers discovered another pair of security flaws in WPA3. Both vulnerabilities allow a brute-force attack on a WiFi network's password.

The findings were reported to the WiFi Alliance, which is now working on an update, which may lead to WPA 3.1. The security researchers blast the WiFi Alliance for its closed standards development process:
But besides just disclosing the two new Dragonblood vulnerabilities, the two researchers also took the chance to criticize the WiFi Alliance again for its closed standards development process that doesn't allow for the open-source community to contribute and prevent big vulnerabilities from making it into the standard in the first place.

"This demonstrates that implementing Dragonfly and WPA3 without side-channel leaks is surprisingly hard," the researchers said. "It also, once again, shows that privately creating security recommendations and standards is at best irresponsible and at worst inept."




 



 

DV Hardware - Privacy statement
All logos and trademarks are property of their respective owner.
The comments are property of their posters, all the rest © 2002-2019 DM Media Group bvba