How to Detect and Attack Evil Twin WiFi Access Points
The evil twin is not just a schlocky plot device for TV crime shows and absurd soap operas, it’s also a threat to your company’s data.
It’s relatively easy for a criminal to set up an evil twin rogue wireless access point that mimics one that your users and visitors connect to, whether on your premises or in a public place, with the intention of stealing usernames and passwords.
That’s one of the reasons why it’s such a good idea to always use a VPN, creating an encrypted tunnel between your computer and a third-party server, preventing snoopers from intercepting information enroute.