Search
Contactez-nous Suivez-nous sur Twitter En francais English Language
 

De la Théorie à la pratique











Freely subscribe to our NEWSLETTER

Newsletter FR

Newsletter EN

Vulnérabilités

Unsubscribe

AirMagnet Enterprise 8.0 Protects Customers from New WPA Vulnerability

November 2008 by Marc Jacob

AirMagnet announced that it is the only WiFi security company to provide protections from a recently discovered vulnerability in WiFi Protected Access (WPA), the security standard created by the WiFi Alliance to provide enhanced security above and beyond that of WEP.

This newly discovered vulnerability allows hackers to attack WPA protected laptops by leveraging a combination of QoS and hacking techniques previously identified in the class of exploits known as Chop-Chop Attacks. AirMagnet Enterprise provides the only industry solution to specifically detect Chop-Chop attacks and has verified the detection of the new WPA-cracking exploit, ensuring that current customers have zero-day protection from the threat without additional updates or patches.

If left undetected the exploit would allow a potential hacker to send seemingly valid messages to an unsuspecting laptop user, which could lead to a number of higher level attacks, such as Man-in-the-Middle attacks or ARP Poisoning. AirMagnet customers running version 8.0 have zero-day protection from this new exploit, while customers running older versions are encouraged to upgrade to the latest version available from AirMagnet.com.

AirMagnet Enterprise is the industry’s premier solution for continuous wireless LAN security and management. The product provides a simple, scalable WLAN monitoring solution that allows complete visibility into all aspects of the network. Enterprise allows organizations to proactively mitigate all types of wireless threats, enforce enterprise policies, prevent performance problems and audit the regulatory compliance of all WLAN assets and users across all locations. It detects and defends against the latest classes of wireless LAN exploits, delivers the industry’s only forensic analysis for spectrum/RF threats and introduces a complete threat intelligence system to classify and prioritize all wireless events for simple management.




See previous articles

    

See next articles