"The attack, described as the first practical attack on WPA,
will be discussed at the PacSec conference in Tokyo next week.
There, researcher Erik Tews will show how he was able to crack WPA
encryption, in order to read data being sent from a router to a
laptop computer. The attack could also be used to send bogus
information to a client connected to the router.
"To do this, Tews and his co-researcher Martin Beck found a way
to break the Temporal Key Integrity Protocol (TKIP) key, used by
WPA, in a relatively short amount of time: 12 to 15 minutes,
according to Dragos Ruiu, the PacSec conference's organizer."
Some of the products that appear on this site are from companies from which QuinStreet receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. QuinStreet does not include all companies or all types of products available in the marketplace.