What is it? The attack is called a Key Reinstallation Attack, or “KRACK” for short (nerds love a tortured acronym as much as the next person). This attack takes advantage of a flaw in the handshake that Wi-Fi devices use to establish trust between one another. This is an important note; the flaw is within […]
If you skipped Part 4 → go back.
If you skipped Part 3 → go back.
This blog should be written 6 times a year. The landscape of security is always changing, and we have to stay in front of this. Here are some items to put on your IT Budget for 2016.