How to protect yourself against the security flaw of wpa2 in router tp
Table of contents:
- How to protect yourself against the security flaw of WPA2 on TP-Link router
- How to protect your devices
The announcement of the vulnerability of the wireless security protocol WPA2, already baptized as KRACK and that takes advantage of the reinstallation of keys to seize user information and control its traffic, has left the industry in shock and, unprotected, at first glance, to the billions of users of this type of technology worldwide.
How to protect yourself against the security flaw of WPA2 on TP-Link router
But beyond the alert created, customers of TP-Link products, who can work in both router mode and access point mode, can 'sleep' in peace, as they are not affected by this security incident. Only when the device works in repeater mode, client mode, WISP mode or WDS bridge mode, is it when they will be at the expense of hackers.
On the other hand, it is important to warn the user that this vulnerability occurs:
- When the hacker is physically close, within the range of his wireless network, when you connect or try to connect to your Wi-Fi network again.
How to protect your devices
Until new firmware is available to address this security breach for your products, TP-Link®, the global provider of trusted connectivity solutions, recommends that you follow these tips:
- In case you use wireless routers: Make sure they work only in router mode or in access point mode and patch the operating system of your smartphones, tablets and computers. In case you are using wireless adapters: make use of the patches offered by the operating systems of your computers.
Ninth generation intel processors protect against specter and meltdown
Ninth generation Intel processors protect against Specter and Meltdown. Find out about security improvements.
MIT researchers find a way to protect against specter and meltdown
A research team at MIT investigates the use of cache mapping technology to protect against Specter and Meltdown.
Gigabyte implements security measures against intel's txe and me security vulnerabilities
GIGABYTE TECHNOLOGY Co. Ltd., a leading manufacturer of motherboards and graphics cards, has implemented security measures aligned with the