August 22, 2011 • 9:29 am
Researchers demonstrate the first wireless security scheme that can protect against “man-in-the-middle” attacks — but doesn’t require a password.
By Larry Hardesty
MIT News Office
In early August, at the Def Con conference — a major annual gathering of computer hackers — someone apparently hacked into many of the attendees’ cell phones, in what may have been the first successful breach of a 4G cellular network. If early reports are correct, the incident was a man-in-the-middle (MITM) attack, so called because the attacker interposes himself between two other wireless devices.
Read the rest of this entry »
Filed under: General technology, Associate Professor, cell phones, Computer Science and Engineering, cryptographic keys, Data Communications, Def Con, DefCon, encryption key, Federal Communications Commission, Government Accountability Office, http://technology-headlines.com, Larry Hardesty, Man-in-the-middle attack, MIT News Office, MITM attack, Mobile phone, Security, Simple security for wireless, technology headlines, Usenix Security symposium, Wi-Fi, WiFi routers, Wireless, wireless devices