KRACK Wi-Fi Vulnerability

We want to let all of our partners know that we are closely following the recently revealed Wi-Fi vulnerability known as KRACK (Key Reinstallation Attack).  This is potentially a serious security risk but we do expect Apple and other vendors to release security updates in the next few days and weeks.  We strongly encourage everyone to minimize or avoid using Wi-Fi in public places such as hotels, planes and coffee shops.  It is also a good idea to turn off your wireless networking on devices when they are not in use.  

What it is?

  • Right now it is a vulnerability, meaning a hacker could break into your wireless connection.  They could then either listen to what your doing, present to be the web site your want to access or put their information on your computer.

What can happen?

  • Sniffing - An attacker can look at the network traffic on your device and see non-encrypted traffic such as unsecured web sites.  
  •  Hijacking - This type off attack would come from very advanced hackers who would pretend to the the server you are connected to.  
  • Malware - The most common type of attack would occur where attackers try to install software on your computer to take your personal information.  
  • Internet enabled devices - Devices such are thermostats, managed lighting and appliances may be at risk.

What is NOT affected?

  • Secured web connections such as banking and Gmail.  Just look for the green lock in your web browser’s address bar. 
  • Cellular Data.  If your Wi-Fi is off, your device is not at risk.
  • Wired ethernet is not affected.

What you can do?

  • Keep your computers and phones patched and up to date.  
  • Make sure phone or iPad is running iOS 10 or newer.
  • Check your Macintosh to make sure it is running Mac OS 10.11 (El Capitan) or newer (Sierra is 10.12).
  • Avoid public Wi-Fi.  
  • Stay informed & stay tuned.  We are following this problem closely.
  • Use wired ethernet connections as often as possible.
  • Turn off your wireless when you don’t need it.

More information: