MIT researchers craft defense against wireless man-in-middle attacks
Sound like something taken right out of the wireless matrix. Vulnerability discover: Hacker rejoice. Vulnerability mitigated: Hackers go back to work looking for new vulnerability.
http://www.networkworld.com/news/2011/082411-mit-tep-250077.html?hpg1=bn