Consumers who wifi on their laptop, tablet or smart phone use still run the risk of being the target of a Karma attack, allowing an attacker could then intercept the traffic of the user. The Karma attack in early 2005 for the first time demonstrated.
The attack is possible because some computers and mobile devices continues to Wi-Fi networks nearby. It sent the name of the Wi-Fi network. A malicious access point can occur later as the network, allowing the laptop, smartphone or tablet automatically connects. An attacker could then perform a man-in-the-middle attack, as he is between the user and the Internet. Although Karma attack is over 10 years old, he is still usable.
For example, the latest Mac OS X version still appears to look for nearby networks where the network name is sent. Also in the case of Ubuntu 14:04 platform is vulnerable to the Karma attack. Windows 7 does not appear to be vulnerable by default because it is not looking for Wi-Fi networks. Researcher Will Dormann of the Software Engineering Institute at Carnegie Mellon University found that the wifi adapter which he used Windows or made vulnerable. The wifi software made to it that there to Wi-Fi networks was sought.
It also appears that older Android versions as Gingerbread vulnerable. In Ice Cream Sandwich was the problem rectified. Also iOS devices proved to be vulnerable. Consumers who want to protect are advised not to use open Wi-Fi networks and previously used Wi-Fi networks that are saved by the system to remove from attack. Dormann also recommends to disable wifi when not in use and keep an eye on what WiFi network the device connects. He further recommends that to connect to networks that have a hidden network name (SSID).
No comments:
Post a Comment