It was announced today that a flaw has been found in WPA2 the encryption standard that protects the majority of business and consumer Wifi. I recommend everyone check that their router has been patched. The flaw allows for eavesdropping on your connect. HTTPS should still be safe but you should assume all HTTP is visible now even on secure wifi connections.
US-CERT has become aware of several key management vulnerabilities in the 4-way handshake of the Wi-Fi Protected Access II (WPA2) security protocol. The impact of exploiting these vulnerabilities includes decryption, packet replay, TCP connection hijacking, HTTP content injection, and others. Note that as protocol-level issues, most or all correct implementations of the standard will be affected. The CERT/CC and the reporting researcher KU Leuven, will be publicly disclosing these vulnerabilities on 16 October 2017.
It is also possible that this will allow DHCP spoofing which could allow hackers to modify your DNS. So if you type in your bank website or even steemit.com you maybe presented with a phishing page instead. Be extra careful to check the SSL certificate is valid.
Accessing Certificates Via Address Bar. You can also view an SSL certificate directly from the address bar. Click on the padlock icon to the right of the website's address and then click the "View Certificate" link. The Certificate dialog box will open.
source: http://smallbusiness.chron.com/can-sites-ssl-certificate-57315.html
This arstechnia article has more links https://arstechnica.com/information-technology/2017/10/severe-flaw-in-wpa2-protocol-leaves-wi-fi-traffic-open-to-eavesdropping/