
Jowi Morales is a tech enthusiast with years of experience working in the industry. He\u2019s been writing with several tech publications since 2021, where he\u2019s been interested in tech hardware and consumer electronics. ","collapsible":{"enabled":true,"maxHeight":250,"readMoreText":"Read more","readLessText":"Read less"}}), "https://slice.vanilla.futurecdn.net/13-4-17/js/authorBio.js"); } else { console.error('%c FTE ','background: #9306F9; color: #ffffff','no lazy slice hydration function available'); } Jowi Morales Social Links Navigation Contributing Writer Jowi Morales is a tech enthusiast with years of experience working in the industry. He’s been writing with several tech publications since 2021, where he’s been interested in tech hardware and consumer electronics.
TechieTwo Is this a surprise to anyone with a clue? Wi-Fi is so insecure that it's laughable. 🙁 Reply
EzzyB TechieTwo said: Is this a surprise to anyone with a clue? Wi-Fi is so insecure that it's laughable. 🙁 Not as bad as it used to be. With previous encryptions you could break into a WiFi network in anywhere from 10 seconds to 10 hours. Reply
JRStern If I'd known how easy being a black hat would be, I'd have majored in it. Reply
Sam Hobbs Is this a new vulnerability or a new exploitation of an old vulnerability? Reply
80251 I can only imagine how secure my amplifier-receiver's WiFi link is, which reminds me, I'd better remember to disable it. Reply
DS426 Sam Hobbs said: Is this a new vulnerability or a new exploitation of an old vulnerability? Not a specific CVE vulnerability but more of a conceptual framework of exploit attack paths due to fundamental design and implementation flaws of client isolation through sequential network layers, e.g. client isolation forced at Layer 2 ("Data Link" layer in OSI model) but not at the Layer 3 ("Network" layer) can allow for MitM positioning. Reply
Key considerations
- Investor positioning can change fast
- Volatility remains possible near catalysts
- Macro rates and liquidity can dominate flows
Reference reading
- https://www.tomshardware.com/tech-industry/cyber-security/SPONSORED_LINK_URL
- https://www.tomshardware.com/tech-industry/cyber-security/researchers-discover-massive-wi-fi-vulnerability-affecting-multiple-access-points-airsnitch-lets-attackers-on-the-same-network-intercept-data-and-launch-machine-in-the-middle-attacks#main
- https://www.tomshardware.com
- Intel mobile CPUs have achieved up to 95x performance uplift over the past two decades — benchmarking the gains from 45nm Penryn to 18A Panther Lake
- SK hynix and SanDisk announce new High Bandwidth Flash — speedy HBF standard is targeted at inference AI servers
- Intel Foundry boss leaves for Qualcomm — Naga Chandrasekaran takes charge of the unit
- Klevv Cras V RGB DDR5-9600 C46 2x24GB review: Binned for pure speed, not your wallet
- Intel mobile CPUs have achieved up to 95x performance uplift over the past two decades — benchmarking the gains from 45nm Penryn to 18A Panther Lake
Informational only. No financial advice. Do your own research.