{"id":48245,"date":"2019-05-10T14:40:37","date_gmt":"2019-05-10T19:40:37","guid":{"rendered":"https:\/\/eshop.macsales.com\/blog\/?p=48245"},"modified":"2019-05-13T09:17:06","modified_gmt":"2019-05-13T14:17:06","slug":"networking-and-security-series-wi-fi-security-revealed","status":"publish","type":"post","link":"https:\/\/eshop.macsales.com\/blog\/48245-networking-and-security-series-wi-fi-security-revealed\/","title":{"rendered":"Networking and Security Series: Wi-Fi Security Revealed"},"content":{"rendered":"<p><a href=\"https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2019\/05\/wireless-security.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-full wp-image-48253\" src=\"https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2019\/05\/wireless-security.png\" alt=\"\" width=\"300\" height=\"271\" srcset=\"https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2019\/05\/wireless-security.png 300w, https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2019\/05\/wireless-security-133x120.png 133w, https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2019\/05\/wireless-security-284x257.png 284w, https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2019\/05\/wireless-security-190x172.png 190w, https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2019\/05\/wireless-security-133x120@2x.png 266w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a>Earlier this week, we began a month-long series designed to bring Rocket Yard readers up to speed on networking and security. The series began with <a href=\"https:\/\/eshop.macsales.com\/blog\/48220-networking-and-security-series-all-about-dns\">an article detailing DNS (Domain Name System)<\/a>, a critical component of the Internet. Today we continue with the series, unraveling the acronyms that describe Wi-Fi security methods, describing some ways that hackers can attack wireless networks, and defining other security measures that can help keep your data safe while using Wi-Fi at home or on the road.<\/p>\n<h2><strong>Why Do I Need To Secure My Mac, iPhone or iPad on a Wireless Network?<\/strong><\/h2>\n<p>Just about every computer, smartphone, or tablet sold these days has Wi-Fi built in. It&#8217;s convenient, usually fast, and lets users enjoy the Internet without the need to be tethered to a wired network with an Ethernet cable. With that convenience comes a necessity to make sure you take the proper steps to ensure that your device and network are set up to keep your personal information from being &#8220;<a href=\"https:\/\/en.wikipedia.org\/wiki\/Packet_analyzer\" target=\"_blank\">sniffed<\/a>&#8221; by a relatively unskilled hacker.<\/p>\n<p>The simplest way to secure your Wi-Fi network or device is to start by making sure that your <a href=\"https:\/\/en.wikipedia.org\/wiki\/Wireless_router\" target=\"_blank\">wireless router<\/a> (the device that connects to the Internet and allows your Wi-Fi enabled devices to connect) has some sort of Wi-Fi security turned on.<\/p>\n<h2><strong>What Wi-Fi Security Standards Are Available?<\/strong><\/h2>\n<p>Here&#8217;s where we start throwing out a few acronyms! Older Wi-Fi networks that require a password to get access to the Internet may use an out-of-date standard from 1997 known as <strong>WEP<\/strong> (Wired Equivalent Privacy). WEP is quite insecure, and passwords can be cracked in a few minutes with software widely available on a number of hacking websites with even the most basic of laptops. If your Wi-Fi router only supports WEP, it&#8217;s highly recommended that you install and use a more modern router than supports the newer security standards.<\/p>\n<p>WEP was replaced in 2003 by <strong>WPA<\/strong> (Wi-Fi Protected Access) and in 2006 by <strong>WPA2<\/strong>, the second-generation of WPA. Most new routers no longer support WEP or WPA, using WPA2 instead as a protocol to encrypt data &#8220;in the air&#8221; between a Wi-Fi device and the router. Devices certified by the Wi-Fi alliance to carry the Wi-Fi trademark require support for advanced encryption methods that are part of the <strong>AES<\/strong> (Advanced Encryption Standard) standard. Those methods use 128-bit key encryption, meaning that it takes a long time for a brute force attack attempting to find the key (by guessing the key) to be completed.<\/p>\n<figure id=\"attachment_48278\" aria-describedby=\"caption-attachment-48278\" style=\"width: 640px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-48278 size-full\" src=\"https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2019\/05\/wpa3-wifi-new-2.jpg\" alt=\"The WPA3 Wi-Fi security standard began rolling out in 2018\" width=\"640\" height=\"282\" srcset=\"https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2019\/05\/wpa3-wifi-new-2.jpg 640w, https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2019\/05\/wpa3-wifi-new-2-272x120.jpg 272w, https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2019\/05\/wpa3-wifi-new-2-284x125.jpg 284w, https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2019\/05\/wpa3-wifi-new-2-190x84.jpg 190w, https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2019\/05\/wpa3-wifi-new-2-272x120@2x.jpg 544w, https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2019\/05\/wpa3-wifi-new-2-284x125@2x.jpg 568w, https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2019\/05\/wpa3-wifi-new-2-190x84@2x.jpg 380w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><figcaption id=\"caption-attachment-48278\" class=\"wp-caption-text\">The WPA3 Wi-Fi security standard began rolling out in 2018<\/figcaption><\/figure>\n<p><strong>WPA3<\/strong> began rolling out in 2018 and not all routers or devices support the new, more secure standard yet. What are the features of WPA3? First, it uses what is called &#8220;individualized data encryption&#8221; on open Wi-Fi networks. This means that the traffic between your device and the Wi-Fi access point is encrypted, even if you never entered a passphrase when you connected to the network. This means that public, open Wi-Fi networks will be much more secure.<\/p>\n<p>Next, WPA3 provides &#8220;robust protections even when users choose passwords that fall short of typical complexity recommendations.&#8221; This is important for one very big reason &#8212; it protects networks against <strong>brute-force attacks<\/strong>, where a malicious party attempts to guess at passwords over and over until the correct one is chosen and the encryption is cracked.<\/p>\n<p>WPA3 should also make it much easier for devices without displays to connect to Wi-Fi networks. What we&#8217;re talking about here are home-automation devices and smart appliances, which currently require a smartphone app to connect to the network. As of yet, there are no details on how this is supposed to work.<\/p>\n<p>Finally, the Wi-Fi Alliance has stated that WPA3 will have a &#8220;192-bit security suite, aligned with the Commercial National Security Algorithm (CNSA) Suite&#8221;. This won&#8217;t help out home users, as it is meant for government, defense, and industrial applications.<\/p>\n<h2><strong>How Can Wi-Fi Security Be Compromised?<\/strong><\/h2>\n<p>There are a lot of ways that a dedicated hacker can compromise Wi-Fi security and have access to your data. Here are just a few examples:<\/p>\n<p><strong>Accidental Association:<\/strong> This occurs when your computer attaches to a wireless access point that is not secured (doesn&#8217;t require a password to join) by accident. You may not know that this has even happened unless you occasionally happen to check the name of the network being used for connectivity. On a Mac, this can be done by clicking the Wi-Fi icon in the menu bar and looking for the active network, which will have a checkmark next to it. On iOS devices, check the active network by tapping on Settings and looking at the network name next to the Wi-Fi icon.<\/p>\n<p><strong>Malicious Association:<\/strong> You know how your Mac and iOS devices can be set up to share a network connection? On iOS devices, it&#8217;s called Personal Hotspot, while on the Mac it&#8217;s called Internet Sharing. A malicious hacker can easily set up a Wi-Fi network that looks like a legitimate network access point, giving it a name like &#8220;Free Airport Wi-Fi&#8221; or &#8220;Guest Wi-Fi&#8221;. Once the hacker has set up the fake network (called a <strong>Soft Access Point<\/strong>), he or she can even set up a fake password request page that&#8217;s similar to a known (Starbucks, AT&amp;T, etc&#8230;) Wi-Fi access point, then grab user names and passwords.<\/p>\n<p>Much more likely is that the hacker will allow access to the network without a password, then use a packet sniffer to copy and analyze whatever is being sent over the network &#8212; your user names and passwords, credit card numbers, and so on. In what is called a <strong>man-in-the-middle attack<\/strong>, the hacker forces your device to drop its connection to a real network and connect to the soft access point, at which point. you need to reenter your password again. There are widely available applications available that make these attacks easy for even beginning hackers.<\/p>\n<p><strong>MAC spoofing:<\/strong> Every device connected to the Internet has a unique <strong>MAC (media access control) address<\/strong>. Many companies &#8212; and even some home users &#8212; set up their wireless networks so that only specific devices with known MAC addresses can access the network. Unfortunately, in order to make itself known to the router or wireless access point, each device also broadcasts its unencrypted MAC address on a regular basis. A hacker can use a freeware packet analyzer application to obtain the MAC address of any device within range, then use that MAC address to appear to be a valid network user.<\/p>\n<p><strong>What Are Some Suggestions for Maintaining a Secure Wi-Fi Connection?<\/strong><\/p>\n<p>Despite the fact that it&#8217;s quite simple for a hacker to break into a Wi-Fi network and sniff packets to gather information, you can make your use of wireless networks much safer by implementing these easy security tips. Just think of it this way &#8212; if you make it more difficult to a hacker to break into your network, they may just try to find an easier target.<\/p>\n<h4><strong>1 &#8211; Hide Your SSID<\/strong><\/h4>\n<p>If you set up a Wi-Fi network in your home or office, you usually set up a unique <strong>SSID<\/strong> (Service Set Identifier). That&#8217;s the &#8220;name&#8221; of the network that you see when making a connection. While many people just leave the default name that comes from the factory (Belkin, D-Link, Linksys) or Internet Service Provider (Comcast, Xfinity, Century Link&#8230;), it&#8217;s much more common to give it a name you&#8217;re familiar with. One good way to prevent others from attempting to break into your Wi-Fi network is to just hide the SSID altogether.<\/p>\n<p>Of course, if you are looking for your network and can&#8217;t see that SSID, how do you connect to it? Using MAC ID filtering or another similar method of only allowing access to specific client devices.<\/p>\n<h4><strong>2 &#8211; Use MAC ID Filtering<\/strong><\/h4>\n<p>Many routers and Wi-Fi access points let the owners set up a list of known, pre-approved MAC addresses. Using <strong>MAC ID Filtering<\/strong>, only those devices with MAC addresses that have been added to the list can connect to the Wi-Fi network. MAC ID filtering can be hard to maintain if you have a lot of Wi-Fi devices, as you&#8217;ll need to add them to the list (and remove old MAC addresses) frequently. In addition, MAC spoofing gives hackers a way to bypass this method altogether.<\/p>\n<h4><strong>3 &#8211; Use Static IP Addressing<\/strong><\/h4>\n<p>Most Wi-Fi routers and access points simply hand out IP addresses unique to that network using what&#8217;s called DHCP (Dynamic Host Configuration Protocol). You connect to a network, and you&#8217;re assigned an IP address from a range of valid addresses. By assigning each device a specific IP address in a limited range of addresses, an attacker can&#8217;t simply grab an IP address to join the network. Once again, this adds complexity to Wi-Fi network setup.<\/p>\n<h4><strong>4 &#8211; Enable Encryption on the Router\/Access Point and All Devices on the Network <\/strong><\/h4>\n<p>The best &#8212; and the easiest &#8212; tool for keeping a Wi-Fi network secure is to enable encryption on your router or access point. Every Wi-Fi labeled router and access point made since 2006 supports WPA2 encryption, and it&#8217;s quite simple to turn on the feature and add a password to your network. To make it more difficult for hackers to guess your password, we recommend using a strong password generator like that available in 1Password or the macOS Keychain Access app.<\/p>\n<p>Keychain Access is found in Applications &gt; Utilities. Once it has been launched, click the iCloud Keychain in the left sidebar, then select File &gt; New Password Item. A screen similar to the one seen below appears:<\/p>\n<figure id=\"attachment_48276\" aria-describedby=\"caption-attachment-48276\" style=\"width: 480px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-48276 size-full\" src=\"https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2019\/05\/Screen-Shot-2019-05-10-at-10.44.42-AM-e1557506863328.png\" alt=\"Adding a Wi-Fi password to the iCloud Keychain\" width=\"480\" height=\"435\" srcset=\"https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2019\/05\/Screen-Shot-2019-05-10-at-10.44.42-AM-e1557506863328.png 480w, https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2019\/05\/Screen-Shot-2019-05-10-at-10.44.42-AM-e1557506863328-132x120.png 132w, https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2019\/05\/Screen-Shot-2019-05-10-at-10.44.42-AM-e1557506863328-284x257.png 284w, https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2019\/05\/Screen-Shot-2019-05-10-at-10.44.42-AM-e1557506863328-190x172.png 190w, https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2019\/05\/Screen-Shot-2019-05-10-at-10.44.42-AM-e1557506863328-132x120@2x.png 264w, https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2019\/05\/Screen-Shot-2019-05-10-at-10.44.42-AM-e1557506863328-190x172@2x.png 380w\" sizes=\"auto, (max-width: 480px) 100vw, 480px\" \/><figcaption id=\"caption-attachment-48276\" class=\"wp-caption-text\">Adding a Wi-Fi password to the iCloud Keychain<\/figcaption><\/figure>\n<p>Type in a simple name for the Keychain item like &#8220;My Router&#8221; and type in an Account Name. Since routers do not require an account name, just type in something like &#8220;Wi-Fi Password&#8221;.<\/p>\n<p>Click the key button, and the Password Assistant appears. To make it easier for you to enter a generated password into your router and type it in from your devices, choose Memorable as the type, then drag the length slider to the right until the password quality bar is completely green (see image below):<\/p>\n<figure id=\"attachment_48277\" aria-describedby=\"caption-attachment-48277\" style=\"width: 480px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-48277\" src=\"https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2019\/05\/Screen-Shot-2019-05-10-at-10.42.36-AM.png\" alt=\"The Password Assistant in Keychain Access is a fast way to create strong passwords. \" width=\"480\" height=\"349\" srcset=\"https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2019\/05\/Screen-Shot-2019-05-10-at-10.42.36-AM.png 660w, https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2019\/05\/Screen-Shot-2019-05-10-at-10.42.36-AM-165x120.png 165w, https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2019\/05\/Screen-Shot-2019-05-10-at-10.42.36-AM-284x207.png 284w, https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2019\/05\/Screen-Shot-2019-05-10-at-10.42.36-AM-190x138.png 190w, https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2019\/05\/Screen-Shot-2019-05-10-at-10.42.36-AM-165x120@2x.png 330w, https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2019\/05\/Screen-Shot-2019-05-10-at-10.42.36-AM-284x207@2x.png 568w, https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2019\/05\/Screen-Shot-2019-05-10-at-10.42.36-AM-190x138@2x.png 380w\" sizes=\"auto, (max-width: 480px) 100vw, 480px\" \/><figcaption id=\"caption-attachment-48277\" class=\"wp-caption-text\">The Password Assistant in Keychain Access is a fast way to create strong passwords.<\/figcaption><\/figure>\n<p>Close the Password Assistant, then click the Add button to add the password to your iCloud keychain for safekeeping.<\/p>\n<p>WPA2 is &#8220;good enough&#8221;, but you might want to consider one of the other types of WPA2 algorithms. When setting up many routers, you&#8217;ll have a choice of &#8220;Security Mode&#8221;. Ignore the &#8220;open&#8221;, WEP 64, WEP 128, WPA-PSK (TKIP), WPA-PSK (AES) and even the WPA2-PSK (TKIP) options, as they are not as secure as WPA2-PSK (AES).<\/p>\n<p>This latter algorithm is currently one of the most secure forms of WPA2. It makes use of the AES encryption protocol, and keeps all data between your devices and the router\/access point fully encrypted at all times. If you have options for WPA2-PSK (TKIP) or WPAWPA2-PSK (TKIP\/AES), you might want to pass on these as well as the TKIP protocol has known vulnerabilities.<\/p>\n<h4><strong>5 &#8211; Use a Virtual Private Network (VPN) When Connecting to Public Wi-Fi<\/strong><\/h4>\n<p>A Virtual Private Network or VPN provides a way to encrypt all traffic from your device to its destination on the Internet. We&#8217;ll cover VPNs in more detail in the third week of this series, but at this time it&#8217;s best to just say that VPNs are a must-have when you&#8217;re using public Wi-Fi.<\/p>\n<hr \/>\n<p>Next week, we&#8217;ll cover the upcoming Wi-Fi 6 standard and how it will improve both speed and security for wireless networks. We&#8217;ll also describe a new model for network security that is called Zero Trust Networking &#8212; it&#8217;s beginning to catch on in enterprise.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Earlier this week, we began a month-long series designed to bring Rocket Yard readers up to speed on networking and security. The series began with an article detailing DNS (Domain Name System), a critical component of the Internet. Today we continue with the series, unraveling the acronyms that describe Wi-Fi security methods, describing some ways [&hellip;]<\/p>\n","protected":false},"author":81,"featured_media":48253,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"spay_email":"","footnotes":""},"categories":[6573],"class_list":["post-48245","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-networking-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.2 (Yoast SEO v20.2) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Networking and Security Series: Wi-Fi Security Revealed<\/title>\n<meta name=\"description\" content=\"Earlier this week, we began a month-long series designed to bring Rocket Yard readers up to speed on networking and security. The series began with an\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/eshop.macsales.com\/blog\/48245-networking-and-security-series-wi-fi-security-revealed\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Networking and Security Series: Wi-Fi Security Revealed\" \/>\n<meta property=\"og:description\" content=\"Earlier this week, we began a month-long series designed to bring Rocket Yard readers up to speed on networking and security. The series began with an\" \/>\n<meta property=\"og:url\" content=\"https:\/\/eshop.macsales.com\/blog\/48245-networking-and-security-series-wi-fi-security-revealed\/\" \/>\n<meta property=\"og:site_name\" content=\"Rocket Yard\" \/>\n<meta property=\"article:author\" content=\"https:\/\/facebook.com\/stevensande\" \/>\n<meta property=\"article:published_time\" content=\"2019-05-10T19:40:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-05-13T14:17:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2019\/05\/wireless-security.png\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"271\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Steve Sande\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Steve Sande\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/eshop.macsales.com\/blog\/48245-networking-and-security-series-wi-fi-security-revealed\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/eshop.macsales.com\/blog\/48245-networking-and-security-series-wi-fi-security-revealed\/\"},\"author\":{\"name\":\"Steve Sande\",\"@id\":\"https:\/\/eshop.macsales.com\/blog\/#\/schema\/person\/1152721d0acb70692858d0f3fcb12e7a\"},\"headline\":\"Networking and Security Series: Wi-Fi Security Revealed\",\"datePublished\":\"2019-05-10T19:40:37+00:00\",\"dateModified\":\"2019-05-13T14:17:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/eshop.macsales.com\/blog\/48245-networking-and-security-series-wi-fi-security-revealed\/\"},\"wordCount\":2008,\"commentCount\":5,\"publisher\":{\"@id\":\"https:\/\/eshop.macsales.com\/blog\/#organization\"},\"keywords\":[\"Encrypt\",\"hacking\",\"iCloud Keychain\",\"MAC ID\",\"Password Assistant\",\"SSID\",\"VPN\",\"WEP\",\"Wi-Fi\",\"Wi-Fi Security\",\"WPA\",\"WPA2\",\"WPA3\"],\"articleSection\":[\"Networking &amp; Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/eshop.macsales.com\/blog\/48245-networking-and-security-series-wi-fi-security-revealed\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/eshop.macsales.com\/blog\/48245-networking-and-security-series-wi-fi-security-revealed\/\",\"url\":\"https:\/\/eshop.macsales.com\/blog\/48245-networking-and-security-series-wi-fi-security-revealed\/\",\"name\":\"Networking and Security Series: Wi-Fi Security Revealed\",\"isPartOf\":{\"@id\":\"https:\/\/eshop.macsales.com\/blog\/#website\"},\"datePublished\":\"2019-05-10T19:40:37+00:00\",\"dateModified\":\"2019-05-13T14:17:06+00:00\",\"description\":\"Earlier this week, we began a month-long series designed to bring Rocket Yard readers up to speed on networking and security. The series began with an\",\"breadcrumb\":{\"@id\":\"https:\/\/eshop.macsales.com\/blog\/48245-networking-and-security-series-wi-fi-security-revealed\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/eshop.macsales.com\/blog\/48245-networking-and-security-series-wi-fi-security-revealed\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/eshop.macsales.com\/blog\/48245-networking-and-security-series-wi-fi-security-revealed\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/eshop.macsales.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Networking and Security Series: Wi-Fi Security Revealed\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/eshop.macsales.com\/blog\/#website\",\"url\":\"https:\/\/eshop.macsales.com\/blog\/\",\"name\":\"Rocket Yard\",\"description\":\"Your source for expert tips, special deals, commentary, reviews, and the latest tech news.\",\"publisher\":{\"@id\":\"https:\/\/eshop.macsales.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/eshop.macsales.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/eshop.macsales.com\/blog\/#organization\",\"name\":\"OWC\",\"url\":\"https:\/\/eshop.macsales.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/eshop.macsales.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2020\/06\/rocket-yard-logo-round.png\",\"contentUrl\":\"https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2020\/06\/rocket-yard-logo-round.png\",\"width\":1024,\"height\":1024,\"caption\":\"OWC\"},\"image\":{\"@id\":\"https:\/\/eshop.macsales.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/eshop.macsales.com\/blog\/#\/schema\/person\/1152721d0acb70692858d0f3fcb12e7a\",\"name\":\"Steve Sande\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/eshop.macsales.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/1ad8e267ec82e12963d9cfe717c9b8e108e1edbb728f5d91fe50c6e7ecd14b15?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/1ad8e267ec82e12963d9cfe717c9b8e108e1edbb728f5d91fe50c6e7ecd14b15?s=96&d=mm&r=g\",\"caption\":\"Steve Sande\"},\"description\":\"Steve has been writing about Apple products since 1986, starting on a bulletin board system, creating the first of his many Apple-related websites in 1994, joining the staff of The Unofficial Apple Weblog in 2008, and founding Apple World Today in 2015. He\u2019s semi-retired, loves to camp and take photos, and is an FAA-licensed drone pilot.\",\"sameAs\":[\"https:\/\/appleworld.today\",\"https:\/\/facebook.com\/stevensande\",\"https:\/\/www.linkedin.com\/in\/stevensande\/\",\"https:\/\/www.youtube.com\/channel\/UCUnDTuaRnXncKQXfQYVNIJA\/\"],\"url\":\"https:\/\/eshop.macsales.com\/blog\/author\/steve-sande\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Networking and Security Series: Wi-Fi Security Revealed","description":"Earlier this week, we began a month-long series designed to bring Rocket Yard readers up to speed on networking and security. The series began with an","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/eshop.macsales.com\/blog\/48245-networking-and-security-series-wi-fi-security-revealed\/","og_locale":"en_US","og_type":"article","og_title":"Networking and Security Series: Wi-Fi Security Revealed","og_description":"Earlier this week, we began a month-long series designed to bring Rocket Yard readers up to speed on networking and security. The series began with an","og_url":"https:\/\/eshop.macsales.com\/blog\/48245-networking-and-security-series-wi-fi-security-revealed\/","og_site_name":"Rocket Yard","article_author":"https:\/\/facebook.com\/stevensande","article_published_time":"2019-05-10T19:40:37+00:00","article_modified_time":"2019-05-13T14:17:06+00:00","og_image":[{"width":300,"height":271,"url":"https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2019\/05\/wireless-security.png","type":"image\/png"}],"author":"Steve Sande","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Steve Sande","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/eshop.macsales.com\/blog\/48245-networking-and-security-series-wi-fi-security-revealed\/#article","isPartOf":{"@id":"https:\/\/eshop.macsales.com\/blog\/48245-networking-and-security-series-wi-fi-security-revealed\/"},"author":{"name":"Steve Sande","@id":"https:\/\/eshop.macsales.com\/blog\/#\/schema\/person\/1152721d0acb70692858d0f3fcb12e7a"},"headline":"Networking and Security Series: Wi-Fi Security Revealed","datePublished":"2019-05-10T19:40:37+00:00","dateModified":"2019-05-13T14:17:06+00:00","mainEntityOfPage":{"@id":"https:\/\/eshop.macsales.com\/blog\/48245-networking-and-security-series-wi-fi-security-revealed\/"},"wordCount":2008,"commentCount":5,"publisher":{"@id":"https:\/\/eshop.macsales.com\/blog\/#organization"},"keywords":["Encrypt","hacking","iCloud Keychain","MAC ID","Password Assistant","SSID","VPN","WEP","Wi-Fi","Wi-Fi Security","WPA","WPA2","WPA3"],"articleSection":["Networking &amp; Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/eshop.macsales.com\/blog\/48245-networking-and-security-series-wi-fi-security-revealed\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/eshop.macsales.com\/blog\/48245-networking-and-security-series-wi-fi-security-revealed\/","url":"https:\/\/eshop.macsales.com\/blog\/48245-networking-and-security-series-wi-fi-security-revealed\/","name":"Networking and Security Series: Wi-Fi Security Revealed","isPartOf":{"@id":"https:\/\/eshop.macsales.com\/blog\/#website"},"datePublished":"2019-05-10T19:40:37+00:00","dateModified":"2019-05-13T14:17:06+00:00","description":"Earlier this week, we began a month-long series designed to bring Rocket Yard readers up to speed on networking and security. The series began with an","breadcrumb":{"@id":"https:\/\/eshop.macsales.com\/blog\/48245-networking-and-security-series-wi-fi-security-revealed\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/eshop.macsales.com\/blog\/48245-networking-and-security-series-wi-fi-security-revealed\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/eshop.macsales.com\/blog\/48245-networking-and-security-series-wi-fi-security-revealed\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/eshop.macsales.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Networking and Security Series: Wi-Fi Security Revealed"}]},{"@type":"WebSite","@id":"https:\/\/eshop.macsales.com\/blog\/#website","url":"https:\/\/eshop.macsales.com\/blog\/","name":"Rocket Yard","description":"Your source for expert tips, special deals, commentary, reviews, and the latest tech news.","publisher":{"@id":"https:\/\/eshop.macsales.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/eshop.macsales.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/eshop.macsales.com\/blog\/#organization","name":"OWC","url":"https:\/\/eshop.macsales.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/eshop.macsales.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2020\/06\/rocket-yard-logo-round.png","contentUrl":"https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2020\/06\/rocket-yard-logo-round.png","width":1024,"height":1024,"caption":"OWC"},"image":{"@id":"https:\/\/eshop.macsales.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/eshop.macsales.com\/blog\/#\/schema\/person\/1152721d0acb70692858d0f3fcb12e7a","name":"Steve Sande","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/eshop.macsales.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/1ad8e267ec82e12963d9cfe717c9b8e108e1edbb728f5d91fe50c6e7ecd14b15?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1ad8e267ec82e12963d9cfe717c9b8e108e1edbb728f5d91fe50c6e7ecd14b15?s=96&d=mm&r=g","caption":"Steve Sande"},"description":"Steve has been writing about Apple products since 1986, starting on a bulletin board system, creating the first of his many Apple-related websites in 1994, joining the staff of The Unofficial Apple Weblog in 2008, and founding Apple World Today in 2015. He\u2019s semi-retired, loves to camp and take photos, and is an FAA-licensed drone pilot.","sameAs":["https:\/\/appleworld.today","https:\/\/facebook.com\/stevensande","https:\/\/www.linkedin.com\/in\/stevensande\/","https:\/\/www.youtube.com\/channel\/UCUnDTuaRnXncKQXfQYVNIJA\/"],"url":"https:\/\/eshop.macsales.com\/blog\/author\/steve-sande\/"}]}},"jetpack_featured_media_url":"https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2019\/05\/wireless-security.png","jetpack_shortlink":"https:\/\/wp.me\/pmPaT-cy9","_links":{"self":[{"href":"https:\/\/eshop.macsales.com\/blog\/wp-json\/wp\/v2\/posts\/48245","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/eshop.macsales.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/eshop.macsales.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/eshop.macsales.com\/blog\/wp-json\/wp\/v2\/users\/81"}],"replies":[{"embeddable":true,"href":"https:\/\/eshop.macsales.com\/blog\/wp-json\/wp\/v2\/comments?post=48245"}],"version-history":[{"count":7,"href":"https:\/\/eshop.macsales.com\/blog\/wp-json\/wp\/v2\/posts\/48245\/revisions"}],"predecessor-version":[{"id":48285,"href":"https:\/\/eshop.macsales.com\/blog\/wp-json\/wp\/v2\/posts\/48245\/revisions\/48285"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/eshop.macsales.com\/blog\/wp-json\/wp\/v2\/media\/48253"}],"wp:attachment":[{"href":"https:\/\/eshop.macsales.com\/blog\/wp-json\/wp\/v2\/media?parent=48245"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/eshop.macsales.com\/blog\/wp-json\/wp\/v2\/categories?post=48245"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}