
"KRACK Attack" exploit breaks WPA2 Wi-Fi security standard
KRACK, short for Key Reinstallation AttaCKs, effectively renders all client-side Wi-Fi devices that utilize the WPA2 standard for security vulnerable. All personal Wi-Fi use can be tracked and manipulated easily. Clients need to be manually updated to fix this vulnerability. Using virtual private networks (VPNs) and websites that utilize HTTPS may help. However, if an attacker controls your Wi-Fi connection, man-in-the-middle attacks will most likely render those worthless.
Using an earlier Wi-Fi security standard, such as WEP or WPA1, is not advised. Those protocols have been broken. The best way for users to have secure connections would be to use a wired connection until the devices they use are updated to patch this exploit.
For more information, visit https://www.krackattacks.com/. "This website presents the Key Reinstallation Attack (KRACK). It breaks the WPA2 protocol by forcing nonce reuse in encryption algorithms used by Wi-Fi."