: Wireless networks that use a popular form of security known as
: Wi-Fi Protected Access (WPA) are vulnerable to an attack that
: could compromise certain communications in less than 15 minutes,
: two researchers plan to tell attendees next week at the PacSec
: 2008 conference in Tokyo.
2GB RAM should be enough for anyone.
- Re: WPA broken?
... "The attack does not allow the key protecting the communications to be recovered, ... The new attack on WPA is not a complete key recovery attack... ...
- Re: [Full-disclosure] When is it valid to claim that a vulnerability leads to a remote attack?
... If by remote you mean "live interaction by the hacker at the point ... , then no, it's not a remote attack. ... remote compromise) is that the result of a successful attack is ... Hosted and sponsored by Secunia - http://secunia.com/ ...
- Re: Crying wolf: False alarms hide attacks : Eight IDSs fail to impress during the monthlong test
... "We considered an attack to be any compromise of any computing resource on ... most IDSs don't offer a means of grouping hosts or networks ... >>Network World Fusion News has a comparison of 8 IDS's. ...
- Re: How useful is a vulnerable home computer ?
... If a hacker can use a simple port scanner than can search the ... Internet with lightning speed and compromise enough systems, ... becomes to tool for the hacker to attack the large company network. ... security software suite can be done for free (although I don't really care ...
- Re: ALERT: WPA-TKIP isnt secure - use WPA2 instead
... USE WPA-AES or WPA2 instead of WPA-TKIP (or WEP) ... Weakness in Passphrase Choice in WPA Interface ... A Practical Message Falsi cation Attack on WPA ... A random character string over 25 characters long is basically uncrackable on a home PC. ...