WPA3 comes to replace the unsafe WPA2

Η Wi-Fi Alliance announcement, which includes various device makers including Apple, Microsoft and Qualcomm, announced the standard on Monday next generation WPA3 wireless network.

The standard will replace WPA2, a security protocol that has been in place for almost two decades and is built to protect almost every wireless device today, such as phones, laptops, and IoT devices.WPA3

One of the key improvements to WPA3 is solving a common security problem: open Wi-Fi networks. ΤOpen Wi-Fi networks at cafes and airports are very convenient but unencrypted, allowing anyone on the same network to monitor data sent from other devices.

WPA3 uses highly personalized data encryption, which scrambles the connection between each device on the network and the router (), ensuring that circulating data is preserved and that the sites you visit have not undergone any malicious processing.

Another key improvement in WPA3 comes to protect against brute-force, making it much more difficult for attackers close to your Wi-Fi network to try out lists of possible passwords.

The new wireless security protocol will prevent any intruder from having some failed password speculation.

The WPA2, a wireless security standard that runs from 2004, uses a handshake (4-way) to allow new devices that have the password to join a network.

The newer WPA3 will use a new kind of handshake that will not be vulnerable to attacks brute-force that use random password lists.

The new WPA3 security standard is expected to be released later this year.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).