The RC4 cipher has been under scrutiny for quite some time. Several research papers detail a variety of methods that would make an attack computationally feasible. The previous minimum data collection time that researchers believed necessary was around 2,000 hours, which was deemed practical enough to be concerning. The new attack is more practical still.
RC4 itself was originally designed in 1987, and systems administrators everywhere have been advised to disable it in their servers' SSL setups. Despite those warnings, it's still available in about 30% of SSL-secured websites. Meanwhile, TKIP is still allowed in 71% of protected Wi-Fi networks. Last March, the Wi-Fi Alliance recommended that administrators disable WPA entirely. Home users should check their router settings and ensure that their Wi-Fi networks are secured using WPA2 only.
|Aerocool's Project 7 P7-C1 Pro case reviewed||6|
|Google Project Tango is dead—long live ARCore||6|
|Thermaltake Sync box bridges RGB LED walled gardens||3|
|Intel tips off potential 960 GB and 1.5 TB Optane SSD 900Ps||6|
|Sapphire Nitro+ Radeon RX Vegas put a big chill on spicy-hot chips||17|
|Antec P110 Silent touts quiet looks and quiet operation||11|
|Updated LG Gram laptops put heavy-duty power into feathery bodies||16|
|Monkey Day Shortbread||14|
|Thursday deals: a nice Z370 mobo, a huge VA display, and more||6|