Gadgetory


All Cool Mind-blowing Gadgets You Love in One Place

Are you using Wifi? You're probably screwed (The 3:59, ep. 299)

2017-10-16
it's Monday October 16th and you know what that means nothing of any real significance it's time for the 359 podcast however I'm BVG and today we have Roger Chang and Alfred Eng and we are here to instill fear in every Monday is something big happening besides being episode 299 of the 350 that's not huge tomorrow's huge but no we're talking about crack we're gonna be time the crack my favorite yeah no no not that kind of Silicon Valley's got a real problem that's true we'll be talking about the latest Wi-Fi vulnerability Alfred our security expert will will break it all down for you we're also about 5g if we have enough time I don't know we're gonna spent a lot of time on crack you can stop by the bed bath beyond just forever so everyone knows this is crack with a k' with the care it's not the drugs all capitalized so it's different yeah so anyways as always if you have any questions I'm sure you will leave them in the comment section but I will pick out the best and we will get to them in three minutes and 59 seconds from 3:00 to welcome to the 359 I'm Rutter Chang I'm Alfred Eng so we're talking about crack no not the drug it's short for ki reinstallation attack and chances are your Wi-Fi hotspot is vulnerable Alfred you wanna break this down for us yeah so the research was released earlier this morning it's a wpa2 flaw it's a you know type of security for Wi-Fi this comes when you through a 4 Way handshake system that this Wi-Fi system uses in the third step usually it sends the password over and it does this handshake there were like four different authentic authentic haters and it comes back to your device in this one it can continuously inject like a false password or you know just essentially getting rid of the encryption port on the third step the third part of the handshake okay and then at that point it allows any attacker to basically look at your network traffic hijack your connections and inject content onto basically your Wi-Fi stream so they can put like a link that you didn't click on into your into your browser or anything like that it should be important to note that this they need to be nearby for this to happen but you know can the range of you know any Wi-Fi connection you can be like down the block and still still attack somebody using this crack vulnerability a lot of the advice that I have been seeing so far is even though can decrypt traffic from your network to your device it can't decrypt you know stuff on secure website so if you're going on HTTPS websites yeah which is the majority of internet your connections could still be secure but the point is they can still inject content into your stream anyway so I mean look just idea that someone can kind of sneak in there through your your Wi-Fi connection is not great I mean are we basically screwed cause a lot of people a lot of these hotspots all use wpa2 so what is the fix for this or is there yeah wpa2 is very common you know like you said there's a lot of devices that do use it a lot of security researchers have already said don't stop using wpa2 you know what else I've heard is really popular lately ethernet cables maybe look let's face it a lot of our devices are wireless mobile that's not really practical it barring the Ethernet solution is there something we can do make sure the devices are patched up or what yeah what's so fix a lot of companies have already issued patches for this after the announcement so companies have known about this for about three months or so but they were working on a fixed towards it before was made publicly public knowledge hmm so you know patch your systems as soon as possible the issue is though for a lot of IOT devices they don't get patches frequently they don't get that many updates so if you have like a smart doorbell that you know you don't want to get patched or anything maybe consider getting like a normal doorbell and said it's a lot of like smartphone op objects that are particularly vulnerable to this all right next up we wanted to talk a little bit about 5g Steven Shanklin has a nice feature on 5g it seemed like it's coming sooner than we thought it was projected initially as 2020 when we talked to folks who say that really the first half of 2019 you might actually start to see 5g phones and that's kind of surprised when most people thought that 5g would show up in your home and sort of fixed broadband connection or with Internet of Things type devices but phones might actually get so that the key the phone is if you're in a crowded area you know like a baseball game or whatever usually your connection sucks with 5g you've got a whole bunch of capacity so your your unlimited data plan will still go super fast even if you're in that crowded room the other benefit of this would be you would not be affected by this crack outbreak nice segways LTE has actually had you know really good security we have time that it's been out nobody's really been able to hijack like an LTE network like that so in that sense of it you know that's another thing you can do if you have the luxury of being on LTE all the time just don't use your Wi-Fi on your mobile devices or run it off of LTE if you can afford to but with Phi G they would definitely make it much easier yep alright for more these stories and more check us out on CNN promoter Jang I'm Alpha ding thanks for listening I have got a lot of work to do in the chat we have for a while we have really wanted and it's awesome thanks everybody for your great comments I'm gonna try to filter through these so that we can actually address some of the questions cuz everybody's really is going back to crack I just like saying that yeah especially when it comes to smart home devices IOT devices we talked a little bit of this before the podcast began like does this mean that I should be trusting more I guess name-brand smart home makers or or is everyone yeah I mean you have to have more of a liability to update it has their name brand you know there's a difference between oh like going on Amazon as an update versus like there's a you know the scrutiny behind you know no-name whatever I don't want her right right right some no-name Amazon like okay all of five people are affected by this but if Ness doesn't update then it's okay this is an entire ecosystem of IOT devices there are you know gonna be mismanaged on this so it does sort of reinforce the idea that when you're buying smart home stuff you do have to buy your the shop smartly you have to be a little bit more choosy about what kinds of equipment who you're buying from I mean the other issue the bigger issue that I'm looking at is you know Wi-Fi enabled like ATMs and cash registers and everything like that because that a lot of you vulnerabilities you know when it comes to something like a store like I don't know Whole Foods or Pizza Hut or Target all of which were breached because of bad you know security on their end on their hardware that's like I think where the biggest issue is you know when these like major companies like these breaches happen and you go there and you buy your quinoa or something and next thing you know you're like credit-card information is stolen because of a vulnerability like this because that terminal is also using wpa2 yeah right got it that's I mean that's what that's how most of these breaches happen got it so there you go like that's I think that's the bigger concern with this one is as you're saying like it's not just your home it's not just your own personal products or devices it is that's the thing like think about how many places use wpa2 I was taking the train into work today and you know on the MTA they have like the Wi-Fi I'm not using that are you kidding yeah so yeah usually when issues like this happen you know it you you should take a like obviously take a look at your own devices first but then you know kind of look around you I like little gate look at your local Starbucks of the Wi-Fi that they use right and any cafe that you go to the airport it's things like you have to be considering like are they updating so what about your home Wi-Fi like I've got I've got a Verizon FiOS modem believe he use wpa2 like what what do I do with the switch there yeah you can switch it yeah the bulk of the questions in the chat is yeah what specific devices are vulnerable I think it's anything that any wpa2 yeah so if you have as our just said if you have a router or something that runs on the PDA wpa2 switch it yeah change it around that's like it looks like a pretty simple fix and you know stay away from websites that don't have HTTPS which you should always do anyway mine at the C net fortunately is a HTTPS as I as I'm like what like three months ago like nice plug yeah so what you're saying is potentially anything there's really nothing that's kind of white listed on this it could be a router it could be Phillips hue yeah I'm just going through the list of some of the contributions from the chat right now my mat dacher says does crack affect all wpa2 including enterprise installations that use 802 dot 1x authentication I'll have to look in into that I mean like this broker I'm like 5 a.m. this morning right you're still a lot of details emerging from this and does this actually could kind of affect a mobile hotspot on a phone asks Donna yeah I mean if it says it's running on wpa2 encryption yeah potentially yeah so the general consensus is am I screwed it's like yeah it's not quick bit over not trying to be inflammatory like this is legit terribly the idea behind the whole like issue like so there's you know monitoring your content and if you're on a website that doesn't have HTTP you know you could enter your password in and then they'd be able to just snatch that out of like the Wi-Fi right but there's also yeah the issue of like injecting content so let's say you go to google.com but you're on like a network like this they can kind of send you a website that looks like it's Google and then ask you to like log in and then get your password that there's like a lot of issues that come with this okay Rob asks how do I know if my router uses wpa2 and how do I switch you can go into your router settings for that I mean I believe it's different for every router for money well your router should have an IP address listed somewhere in the manual printed on the bottom you should find it easier like if you have like like I have my finest bottom the information is printed on sticker on the modem it's so then when I set your Wi-Fi password you can also set the type of encryption that you want it to have change it from wpa2 most likely would help fix that what and what is the alternative like what's the one there's like tlk PS and there's always like other stuff I like it's not coming to me right now but right there there's a lot of options okay Michael Brown is asking how can you tell if your Wi-Fi has been breached I mean it's hard to tell there there's no like warning sign out there or anything like that that's the issue of like Wi-Fi breaches is that they're very you know hidden because your Wi-Fi doesn't know the difference like it just thinks that someone else has connected to it so I mean the best operating procedure then is just assume you've already been hacked and just change everything I mean the most like like to me I don't think you know the average person is gonna be targeted by this but either way you just want to keep yourself safe you you know the don't think that like people aren't gonna be after you right I guess you know most of the times attackers look for something that's like the easiest thing to hit and if you have a vulnerability like this yeah and I think that do you put the subway acts like if you see free public Wi-Fi you should probably stay off of it yeah yeah yeah basically stay away from any like kind of like watering hole attacks so a lot of times attackers look for places where a lot of people will be in connect to the Wi-Fi yeah how I don't know is it alligators or lions how to attack people at water animals at water alligators yeah sure yeah yeah weird analogy it's called the watering hole attack let's keep coming up on that analogies I was gonna call it the Goldilocks syndrome like you say no one is safe they think oh they're not gonna could be after me I just if the door is open yeah that's basically it and you know I think it's really important to pay attention in these kind of breaches or not breaches but just like announcements of these vulnerabilities and patches making sure that your products are the latest because when you're a large business and you don't patch that's what happened to Equifax and that's why I have the country's social security number it was one guys fault the corner just subdued yeah poor schlub yeah so for in Equifax this case they had it was the Apache server like flaw that was announced in March and they didn't patch it and I think that's used it I think that's what makes this scary is that there are gonna be plenty of Equifax is in this situation that we plan to come back to ignore this is way easier to break into them than the issue of Equifax so that's what you know obviously every person out there should should you know patch their own systems but but we also have to hope that everyone else yes yeah yeah is like even if you do everything right you could still be breach because some like super market that you go to update their self true full disclosure I mean I've use wpa2 at home for as long as I can remember and I didn't know buy this until I came into work this morning's was like crap alright no one no one really knew that it's time broke this right but I mean if I had actually checked the headlines before I walked up the door this morning would have a different story but I mean I don't even know if the time I had what I'm going to switch to but it's a cat suddenly we're suddenly all have to be Wi-Fi security a spurts well this is all information we're gonna have a ton of coverage FAQ is explainers how to's on how to make your networks a little bit more secure how to defend yourself so definitely check that check it all out seen it Alfred you may be getting some calls for me tonight oh boy frantic calls I'm just gonna be on stream like the whole day because like Skype the whole thing and just like my panic attacks as I'm home calling Alfred tears my timer is on wpa2 also no all right I think that's as far as we can get right now like we said it's still kind of early it is a lot as the stuff is still breaking we're gonna have plenty more to talk about the next few days the problem is the updated yeah but thanks for tuning in and Roger you want to send us out yeah as always if you liked anything you saw or heard here check us out on CNET our podcast is also available on iTunes TuneIn stitcher SoundCloud Feedburner and Google Play Music we'll see you all tomorrow see you tomorrow thanks everyone stay safe you
We are a participant in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for us to earn fees by linking to Amazon.com and affiliated sites.