It still can't be done. This device is not doing anything new except using a faster way to brute-force attack an unknown password. Unless someone uses weak passphrases, there is nothing to worry about. The weaker the passphrase, the easier it is to guess.
From the Tomshardware article:
Wireless Security Auditor performs advanced dictionary search attacks with mutation to expose weak passwords consisting of words and phrases in spoken languages. The software also allows highly customized mutations of ordinary words to perform hundreds of mutations on each word in order to ensure the most attack coverage possible. Standard alpha-numeric incremental attacks are also supported, but naturally take a long time, even for supercomputers.
In other words, this is the standard brute-force method of password guessing. It's telling that it hasn't chosen the PSK, but it's instead chosen dictionary words, like...
... and customized mutations, such as spaghetti and meatballs ...
spaghetti and meatballs
spaghetti & meatballs
This means that WPA hasn't been cracked -- they're attacking the human-generated passphrase! Whatever passphrase you chose is hashed together with your SSID and then converted into a 256-bit key (32-bytes).
http://www.wireshark.org/tools/wpa-psk.html is a safe tool that will help you see this work -- for example, if your SSID is dlink and your pass phrase is "this is a test' then your key is f6deb25c82479391e75132e6dcb0effbf56deb25f2b6ac69373306b6e4c0311f (and yes you can use that key instead of your passphrase and even mix them -- use the key on some devices, use the passphrase on others, and all devices will work).
Obviously, a program can also run all combinations of the above -- from
ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff. However, doing that takes more computing power or time than virtually anyone has, so it's unlikely your neighbors will stumble upon your particular combination any time soon.
WPA has not been cracked
Easy passwords have always been quickly guessed, todays article is about software that makes guessing them faster and attacks the WPA passphrase using dictionary words.
For best results, choose a passphrase that avoids dictionary words or common permutations or create a random 256-bit key -- such as the 64-Random Hex one generated by https://www.grc.com/passwords.htm.