Skip to main content

ARP spoofing - Wireless Security

posted onDecember 13, 2001
by hitbsecnews

Think you've got a secure wireless connection to a trusted party? Don't be too sure. Attackers can use a technique known as ARP spoofing to convince two machines that they are communicating with each other, when both are actually connected to a third computer under hostile control. IBM developerWorks article

This is nothing new, but an interesting article nevertheless.

Source

Tags

Wireless

You May Also Like

Recent News

Tuesday, July 9th

Wednesday, July 3rd

Friday, June 28th

Thursday, June 27th

Thursday, June 13th

Wednesday, June 12th

Tuesday, June 11th

Friday, June 7th

Thursday, June 6th

Wednesday, June 5th