Additionally, the standard will strengthen user privacy in open networks through individualized data encryption, which would prevent people from spying on network traffic on open networks. Wi-Fi Alliance ensured that WPA3 will have "backward compatibility", so companies do not have worry about a complete overhaul of older devices.
Wi-Fi Alliance, a non-profit organization that decides Wi-Fi standards, has announced the release of WPA3 with several security improvements over WPA2 after the KRACK exploit a year ago affected nearly every Wi-Fi supported device.
Two features, likely aimed at personal use, give greater protection to networks even when the chosen passwords "fall short of typical complexity recommendations", and while no intricate details about the new method have been shared, this has been speculated to be a new kind of interaction between devices and networks. Cyberthreats have grown in both variety and frequency over the last few decades, and the current state of WPA2 simply does meet the new level of security standards.More news: Microsoft unveils pre-order information on the Windows 10 GLAS thermostat
"Security is a foundation of Wi-Fi Alliance certification programs, and we are excited to introduce new features to the Wi-Fi CERTIFIED family of security solutions", concludes Edgar Figueroa, president and CEO of Wi-Fi Alliance.
WPA3 will protect against that exploit, along with others.
With Wi-Fi CERTIFIED WPA3, the Alliance hopes that security in an Internet increasingly seen as leaky will again be at the forefront. Essentially it will protect against brute-force dictionary attacks by blocking authentication after a set number of failed login attempts. Because the Wi-Fi Protected Alliance must certify hardware before it can use the WPA3 protocol, it could take several months before companies can support the new security protocol.More news: Boosts Stake in Vanguard Consumer Discretionary ETF (VCR)
Evolving security threats call for change in network security standards, which is why WPA3 has been so highly anticipated. Passwords can also be cracked offline if a cyberattacker observes an authorized user connecting to the network.
The US Department of Commerce and the Department of Homeland Security also recently recognized the need to evolve network security for defending against attacks against connected medical and IoT devices.More news: Grandparents who claimed pot was meant for Christmas gifts arrested again