
This past week has seen an explosion of cautions extended to people using home Wi-Fi networks (which of course is pretty much ALL of us) regarding a security risk that makes private information and personal content increasingly vulnerable to theft or misuse. It’s certainly not the first time such an issue has come to the attention of the digital world, and it won’t be the last. This one, however, is particularly noteworthy given the fact that it has such far-reaching and widespread potentially negative implications for anyone who’s on the web via a Wi-Fi connection – at home or elsewhere. Here at 4GoodHosting, we strive to be on top of trends and developments in the industry to go along with being a premier Canadian web hosting provider. This ‘heads up’ should be especially welcome for business owners operating an e-commerce website, but we imagine it’s going to also be well received by your average web browsing guy or gal as well. Malevolence from your Modem? Credit for catching this new flaw goes to a team of Belgian researchers. They’re the ones who recently discovered a security vulnerability in the WPA2 protocol. The WPA2 protocol is a system of rules that dictate how your Wi-Fi networks function and behave. As mentioned, it’s a near ubiquitous and wide-reaching ‘standard’ – it’s installed and in use with almost every single modern Wi-Fi modem or router. We’re going to go ahead and assume that includes you, and as such this warning is one you’ll want to take note of and follow the precautionary measures we’ll lay out here. The research has indicated that there’s a loophole in the WPA2 rules that’s creating the possibility for hackers to tap into a Wi-Fi network and grab sensitive information that’s being relayed back and forth over it, with one example (and likely the most disconcerting of all the possibilities) being stealing your credit card details when enter them in the process of buying something online. Another possibility could be snagging your password when you enter it into the login for a particular website. Here is a good read on the issue in detail, via the official website....