{"id":71209,"date":"2017-10-20T15:51:25","date_gmt":"2017-10-20T22:51:25","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=71209"},"modified":"2023-04-07T16:46:45","modified_gmt":"2023-04-07T23:46:45","slug":"wi-fi-krack-vulnerabilities-faq-for-mac-iphone-and-ipad-users","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/wi-fi-krack-vulnerabilities-faq-for-mac-iphone-and-ipad-users\/","title":{"rendered":"Wi-Fi KRACK Vulnerabilities: FAQ for Mac, iPhone and iPad Users"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-71266\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/WiFi-KRACK-Apple-FAQ.jpg\" alt=\"Wi-Fi KRACK Vulnerabilities: FAQ for Mac, iPhone and iPad Users\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/WiFi-KRACK-Apple-FAQ.jpg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/WiFi-KRACK-Apple-FAQ-150x75.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/WiFi-KRACK-Apple-FAQ-300x150.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>This week,\u00a0<a href=\"https:\/\/www.krackattacks.com\/\" target=\"_blank\" rel=\"noopener\">security reports\u00a0emerged<\/a>\u00a0detailing\u00a0multiple vulnerabilities in the WPA2 protocol. WPA2 is used to secure Wi-Fi and is used around the world as the standard. If you use Wi-Fi, you use WPA2. Security researchers discovered that a hacker within range of a victim can exploit the Wi-Fi vulnerabilities using a <strong>k<\/strong>ey <strong>r<\/strong>einstallation <strong>a<\/strong>tta<strong>ck<\/strong>\u00a0(KRACK). In this article, we&#8217;ll try and answer some of the common questions that users of Apple products have raised about this issue.<\/p>\n<h3>What is\u00a0the Wi-Fi KRACK attack?<\/h3>\n<p>Discovered by Mathy Vanhoef of imec-DistriNet, their report stated the following:<\/p>\n<blockquote><p>Concretely, attackers can use this novel attack technique to read information that was previously assumed to be safely encrypted. This can be abused to steal sensitive information such as credit card numbers, passwords, chat messages, emails, photos, and so on. <strong>The attack works against all modern protected Wi-Fi networks<\/strong>. Depending on the network configuration, it is also possible to inject and manipulate data. For example, an attacker might be able to inject ransomware or other malware into websites.<\/p><\/blockquote>\n<p>The researcher further explained where the vulnerabilities exist,\u00a0what circumstances Wi-Fi users are affected, and how to prevent the attack:<\/p>\n<blockquote><p>The weaknesses are in the Wi-Fi standard itself, and not in individual products or implementations. Therefore, any correct implementation of WPA2 is likely affected. To prevent the attack, users must update affected products as soon as security updates become available. Note that <strong>if your device supports Wi-Fi, it is most likely affected<\/strong>. During our initial research, we discovered ourselves that Android, Linux, Apple, Windows, OpenBSD, MediaTek, Linksys, and others, are all affected by some variant of the attacks.<\/p><\/blockquote>\n<h3>Should Apple users be concerned?<\/h3>\n<p>Technical details were\u00a0extensively covered over the past\u00a0few days, but an answer to the most common question remains hard to find or buried in technical jargon:\u00a0<strong>Should Apple users\u00a0be worried?<\/strong><\/p>\n<p>In short: <strong>Probably not.<\/strong><\/p>\n<p>These vulnerabilities can be addressed with patches to your router\/access point (AP),\u00a0and Apple has stated that the company is working on an update to patch the flaws. An Apple spokesperson sent the following statement to\u00a0<a href=\"https:\/\/techcrunch.com\/2017\/10\/17\/microsoft-already-published-a-krack-fix-apple-and-google-are-working-on-it\/\" target=\"_blank\" rel=\"noopener\">Romain Dillet of TechCrunch<\/a>:<\/p>\n<blockquote><p>\u201cApple is deeply committed to protecting our customers\u2019 data. The fix for the KRACK WiFi vulnerability is currently in the betas of iOS, macOS, watchOS and tvOS and will soon be rolled out to customers.\u201d<\/p><\/blockquote>\n<p>Until then, your W-Fi is technically not as secure as it should be. Depending on your level of paranoia, pressure from clients you may support or the industry you&#8217;re in, these vulnerabilities may have caused some sleepless nights over the past several days. But for most of you, there really isn&#8217;t much to worry about.<\/p>\n<p>As an individual consumer, there&#8217;s very little chance that\u00a0someone is sitting outside of your\u00a0house trying to exploit these vulnerabilities; however, if you are responsible for securing Wi-Fi for a school campus, hospital or other kind of business, then this situation might be a real problem. Not so much because these vulnerabilities are actively being exploited, but because businesses need to meet certain conditions and certifications to protect user data \u2014 with these vulnerabilities, that technically cannot be guaranteed.<\/p>\n<p>That said, hackers are surely working on a script or app to exploit these vulnerabilities this very moment, so the longer these vulnerabilities remain\u00a0unpatched, the higher the risk will become.<\/p>\n<p><strong>A few things to keep in mind:<\/strong><\/p>\n<ol>\n<li>For these vulnerabilities to be exploited, an attacker needs to be in physical proximity to your network. This is not something that can be exploited by a hacker in another country, for example.<\/li>\n<li>It&#8217;s not the WPA2 encryption that has vulnerabilities. This means\u00a0your encrypted traffic over a WPA2 Wi-Fi connection is still encrypted, unless you use Android, Linux or other clients that use the open-source wpa_supplicant software library. For Apple&#8217;s operating systems, WPA2 encryption is still good and an attacker cannot decrypt all of your traffic.<\/li>\n<li>Apple has said <a href=\"http:\/\/appleinsider.com\/articles\/17\/10\/16\/apple-confirms-krack-wi-fi-wpa-2-attack-vector-patched-in-ios-tvos-watchos-macos-betas\" target=\"_blank\" rel=\"noopener\">these vulnerabilities were addressed<\/a> in house and will be part of updates coming to all OS versions soon.<\/li>\n<\/ol>\n<h3>How to protect yourself from Wi-Fi KRACK Flaws<\/h3>\n<p>The best thing you can do is find out if patches are available and install them. Several AP manufacturers have already released patches for their hardware, so you can go to their websites or call and ask for the patch. Typically if you registered your router or AP with the manufacturer, they have your email address on file and will send out an email about such patches. If your Wi-Fi is provided by your Internet Service Provider (ISP) where most modems have Wi-Fi built in, contact them to see if this issue is being addressed. Consumers typically do not have full access to their modem, so software and firmware updates must be pushed out by the ISP.<\/p>\n<p>Using a <a href=\"https:\/\/www.intego.com\/mac-security-blog\/why-you-should-connect-to-a-vpn-on-mac-and-ios-and-how-to\/\" target=\"_blank\" rel=\"noopener\">Virtual Private Network (VPN)<\/a> and visiting websites that use HTTPS will add another layer of security. Though websites that do not implement HTTPS properly can be tricked into downgrading to HTTP, the use of a VPN will at least secure the traffic between your computer and the access point (AP) you are connected to.\u00a0Of course, by using ethernet instead of Wi-Fi where possible, you will have nothing to do with the KRACK vulnerabilities. You&#8217;d still need to patch your OS and AP hardware when patches are released, but until then it&#8217;s business as usual via ethernet.<\/p>\n<p>Knowing if you&#8217;re connecting to an AP that has yet to be patched becomes much harder once you leave your house or office. Sure, you can ask the barista at Starbucks if their AP was patched, but you&#8217;ll likely get a very confused look. The same goes for any establishment that offers Wi-Fi to their guests and you may never find out. If unpatched, this is a vulnerability that will last forever on that hardware, so if you do find yourself using Starbucks Wi-Fi often, perhaps a call to their HQ might be a good idea. Fortunately, when you need Wi-Fi on the go, there is one solution that may offer better security: <a href=\"https:\/\/www.intego.com\/mac-security-blog\/this-home-vpn-router-setup-protects-your-traffic-wherever-you-are\/\" target=\"_blank\" rel=\"noopener\">This Home VPN Router Setup Protects Your Traffic Wherever You Are<\/a>.<\/p>\n<p><em>Have something to say about this story? Share your comments below!\u00a0<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This week,\u00a0security reports\u00a0emerged\u00a0detailing\u00a0multiple vulnerabilities in the WPA2 protocol. WPA2 is used to secure Wi-Fi and is used around the world as the standard. If you use Wi-Fi, you use WPA2. Security researchers discovered that a hacker within range of a victim can exploit the Wi-Fi vulnerabilities using a key reinstallation attack\u00a0(KRACK). In this article, we&#8217;ll [&hellip;]<\/p>\n","protected":false},"author":79,"featured_media":71269,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[151,5],"tags":[3694,2878,3697,385],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"This week,\u00a0security reports\u00a0emerged\u00a0detailing\u00a0multiple vulnerabilities in the WPA2 protocol. WPA2 is used to secure Wi-Fi and is used around the world as\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/wi-fi-krack-vulnerabilities-faq-for-mac-iphone-and-ipad-users\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Wi-Fi KRACK Vulnerabilities: FAQ for Mac, iPhone and iPad Users - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"This week,\u00a0security reports\u00a0emerged\u00a0detailing\u00a0multiple vulnerabilities in the WPA2 protocol. WPA2 is used to secure Wi-Fi and is used around the world as\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wi-fi-krack-vulnerabilities-faq-for-mac-iphone-and-ipad-users\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2017-10-20T22:51:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-04-07T23:46:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/WiFi-KRACK-Flaws.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jay Vrijenhoek\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/wi-fi-krack-vulnerabilities-faq-for-mac-iphone-and-ipad-users\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/WiFi-KRACK-Flaws.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/WiFi-KRACK-Flaws.jpg\",\"width\":400,\"height\":260},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/wi-fi-krack-vulnerabilities-faq-for-mac-iphone-and-ipad-users\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wi-fi-krack-vulnerabilities-faq-for-mac-iphone-and-ipad-users\/\",\"name\":\"Wi-Fi KRACK Vulnerabilities: FAQ for Mac, iPhone and iPad Users - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/wi-fi-krack-vulnerabilities-faq-for-mac-iphone-and-ipad-users\/#primaryimage\"},\"datePublished\":\"2017-10-20T22:51:25+00:00\",\"dateModified\":\"2023-04-07T23:46:45+00:00\",\"description\":\"This week,\\u00a0security reports\\u00a0emerged\\u00a0detailing\\u00a0multiple vulnerabilities in the WPA2 protocol. WPA2 is used to secure Wi-Fi and is used around the world as\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/wi-fi-krack-vulnerabilities-faq-for-mac-iphone-and-ipad-users\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/wi-fi-krack-vulnerabilities-faq-for-mac-iphone-and-ipad-users\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/wi-fi-krack-vulnerabilities-faq-for-mac-iphone-and-ipad-users\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Wi-Fi KRACK Vulnerabilities: FAQ for Mac, iPhone and iPad Users\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/wi-fi-krack-vulnerabilities-faq-for-mac-iphone-and-ipad-users\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/wi-fi-krack-vulnerabilities-faq-for-mac-iphone-and-ipad-users\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0\"},\"headline\":\"Wi-Fi KRACK Vulnerabilities: FAQ for Mac, iPhone and iPad Users\",\"datePublished\":\"2017-10-20T22:51:25+00:00\",\"dateModified\":\"2023-04-07T23:46:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/wi-fi-krack-vulnerabilities-faq-for-mac-iphone-and-ipad-users\/#webpage\"},\"wordCount\":1038,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/wi-fi-krack-vulnerabilities-faq-for-mac-iphone-and-ipad-users\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/WiFi-KRACK-Flaws.jpg\",\"keywords\":[\"KRACK\",\"Router\",\"Routers\",\"Wi-Fi\"],\"articleSection\":[\"Recommended\",\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/wi-fi-krack-vulnerabilities-faq-for-mac-iphone-and-ipad-users\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0\",\"name\":\"Jay Vrijenhoek\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g\",\"caption\":\"Jay Vrijenhoek\"},\"description\":\"Jay Vrijenhoek is an IT consultant with a passion for Mac security research.\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/jay-vrijenhoek\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"This week,\u00a0security reports\u00a0emerged\u00a0detailing\u00a0multiple vulnerabilities in the WPA2 protocol. WPA2 is used to secure Wi-Fi and is used around the world as","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/wi-fi-krack-vulnerabilities-faq-for-mac-iphone-and-ipad-users\/","og_locale":"en_US","og_type":"article","og_title":"Wi-Fi KRACK Vulnerabilities: FAQ for Mac, iPhone and iPad Users - The Mac Security Blog","og_description":"This week,\u00a0security reports\u00a0emerged\u00a0detailing\u00a0multiple vulnerabilities in the WPA2 protocol. WPA2 is used to secure Wi-Fi and is used around the world as","og_url":"https:\/\/www.intego.com\/mac-security-blog\/wi-fi-krack-vulnerabilities-faq-for-mac-iphone-and-ipad-users\/","og_site_name":"The Mac Security Blog","article_published_time":"2017-10-20T22:51:25+00:00","article_modified_time":"2023-04-07T23:46:45+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/WiFi-KRACK-Flaws.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Jay Vrijenhoek","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/wi-fi-krack-vulnerabilities-faq-for-mac-iphone-and-ipad-users\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/WiFi-KRACK-Flaws.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/WiFi-KRACK-Flaws.jpg","width":400,"height":260},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/wi-fi-krack-vulnerabilities-faq-for-mac-iphone-and-ipad-users\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/wi-fi-krack-vulnerabilities-faq-for-mac-iphone-and-ipad-users\/","name":"Wi-Fi KRACK Vulnerabilities: FAQ for Mac, iPhone and iPad Users - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/wi-fi-krack-vulnerabilities-faq-for-mac-iphone-and-ipad-users\/#primaryimage"},"datePublished":"2017-10-20T22:51:25+00:00","dateModified":"2023-04-07T23:46:45+00:00","description":"This week,\u00a0security reports\u00a0emerged\u00a0detailing\u00a0multiple vulnerabilities in the WPA2 protocol. WPA2 is used to secure Wi-Fi and is used around the world as","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/wi-fi-krack-vulnerabilities-faq-for-mac-iphone-and-ipad-users\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/wi-fi-krack-vulnerabilities-faq-for-mac-iphone-and-ipad-users\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/wi-fi-krack-vulnerabilities-faq-for-mac-iphone-and-ipad-users\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Wi-Fi KRACK Vulnerabilities: FAQ for Mac, iPhone and iPad Users"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/wi-fi-krack-vulnerabilities-faq-for-mac-iphone-and-ipad-users\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/wi-fi-krack-vulnerabilities-faq-for-mac-iphone-and-ipad-users\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0"},"headline":"Wi-Fi KRACK Vulnerabilities: FAQ for Mac, iPhone and iPad Users","datePublished":"2017-10-20T22:51:25+00:00","dateModified":"2023-04-07T23:46:45+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/wi-fi-krack-vulnerabilities-faq-for-mac-iphone-and-ipad-users\/#webpage"},"wordCount":1038,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/wi-fi-krack-vulnerabilities-faq-for-mac-iphone-and-ipad-users\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/WiFi-KRACK-Flaws.jpg","keywords":["KRACK","Router","Routers","Wi-Fi"],"articleSection":["Recommended","Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/wi-fi-krack-vulnerabilities-faq-for-mac-iphone-and-ipad-users\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0","name":"Jay Vrijenhoek","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g","caption":"Jay Vrijenhoek"},"description":"Jay Vrijenhoek is an IT consultant with a passion for Mac security research.","url":"https:\/\/www.intego.com\/mac-security-blog\/author\/jay-vrijenhoek\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/WiFi-KRACK-Flaws.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-iwx","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/71209"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/79"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=71209"}],"version-history":[{"count":22,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/71209\/revisions"}],"predecessor-version":[{"id":97664,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/71209\/revisions\/97664"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/71269"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=71209"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=71209"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=71209"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}