4.2 • 639 Ratings
🗓️ 19 October 2017
⏱️ 2 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Understanding the human body is a team effort. That's where the Yachtel group comes in. |
0:05.8 | Researchers at Yachtolt have been delving into the secrets of probiotics for 90 years. |
0:11.0 | Yacold also partners with nature portfolio to advance gut microbiome science through the global grants for gut health, an investigator-led research program. |
0:19.6 | To learn more about Yachtolt, visit yawcult.co. |
0:22.7 | .j.p. That's Y-A-K-U-L-T.C-O.J-P. When it comes to a guide for your gut, count on Yacult. |
0:33.8 | This is Scientific American's 60-second science. I'm Larry Greenmire. |
0:38.3 | It seems every week we find out that someone broke into a big company's databases, |
0:43.3 | like the recent Equifax data breach, and made off with millions of credit card numbers, passwords, and other valuable info. |
0:50.3 | And now, a new kind of worry. Someone could hijack your wireless home network and steal your info from under your nose. |
0:57.0 | That's the possibility raised by a couple of cybersecurity researchers from the Catholic University of Lvonne in Belgium. |
1:03.0 | The problem, they say, is a flaw in the very protocol meant to make Wi-Fi secure. |
1:08.0 | That protocol is called Wi-Fi Protected Access 2, WPA2, and WPA2's weakness |
1:14.8 | could allow an attacker within physical range of your Wi-Fi network to make a copy of that |
1:19.7 | network that they could then control. The researchers call their approach a key reinstallation |
1:24.9 | attack, or crack. It's important to know that a crack attack remains a hypothetical for now. |
1:30.3 | The scientists realize a threat while investigating wireless security. |
1:34.3 | They'll present this research on November 1st at the Computer and Communications Security Conference in Dallas |
1:39.3 | and in December at the Black Hat Europe conference in London. |
1:43.3 | In their crack scenario, wireless devices would be fooled into connecting to the bogus network, |
1:48.8 | and the attacker would be able to access all of the info that devices send and receive while |
1:53.1 | connected to that network, even if that info has been encrypted. Android and Linux would be especially |
1:58.4 | vulnerable because of how their encryption keys are configured. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from Scientific American, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of Scientific American and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.