Researchers discover massive Wi-Fi vulnerability affecting multiple access points — AirSnitch lets attackers on the same network intercept data and launch machi

Researchers discover massive Wi-Fi vulnerability affecting multiple access points — AirSnitch lets attackers on the same network intercept data and launch machi

Jowi Morales is a tech enthusiast with years of experience working in the industry. He\u2019s been writing with several tech publications since 2021, where he\u2019s been interested in tech hardware and consumer electronics. ","collapsible":{"enabled":true,"maxHeight":250,"readMoreText":"Read more","readLessText":"Read less"}}), "https://slice.vanilla.futurecdn.net/13-4-17/js/authorBio.js"); } else { console.error('%c FTE ','background: #9306F9; color: #ffffff','no lazy slice hydration function available'); } Jowi Morales Social Links Navigation Contributing Writer Jowi Morales is a tech enthusiast with years of experience working in the industry. He’s been writing with several tech publications since 2021, where he’s been interested in tech hardware and consumer electronics.

TechieTwo Is this a surprise to anyone with a clue? Wi-Fi is so insecure that it's laughable. 🙁 Reply

EzzyB TechieTwo said: Is this a surprise to anyone with a clue? Wi-Fi is so insecure that it's laughable. 🙁 Not as bad as it used to be. With previous encryptions you could break into a WiFi network in anywhere from 10 seconds to 10 hours. Reply

JRStern If I'd known how easy being a black hat would be, I'd have majored in it. Reply

Sam Hobbs Is this a new vulnerability or a new exploitation of an old vulnerability? Reply

80251 I can only imagine how secure my amplifier-receiver's WiFi link is, which reminds me, I'd better remember to disable it. Reply

DS426 Sam Hobbs said: Is this a new vulnerability or a new exploitation of an old vulnerability? Not a specific CVE vulnerability but more of a conceptual framework of exploit attack paths due to fundamental design and implementation flaws of client isolation through sequential network layers, e.g. client isolation forced at Layer 2 ("Data Link" layer in OSI model) but not at the Layer 3 ("Network" layer) can allow for MitM positioning. Reply

Key considerations

  • Investor positioning can change fast
  • Volatility remains possible near catalysts
  • Macro rates and liquidity can dominate flows

Reference reading

More on this site

Informational only. No financial advice. Do your own research.

Leave a Comment