ARP spoofing - Wireless Security
Think you've got a secure wireless connection to a trusted party? Don't be too sure. Attackers can use a technique known as ARP spoofing to convince two machines that they are communicating with each other, when both are actually connected to a third computer under hostile control. IBM developerWorks article
This is nothing new, but an interesting article nevertheless.