Skip to main content

How to Detect and Attack Evil Twin WiFi Access Points

posted onApril 3, 2015
by l33tdawg

The evil twin is not just a schlocky plot device for TV crime shows and absurd soap operas, it’s also a threat to your company’s data.

It’s relatively easy for a criminal to set up an evil twin rogue wireless access point that mimics one that your users and visitors connect to, whether on your premises or in a public place, with the intention of stealing usernames and passwords.

That’s one of the reasons why it’s such a good idea to always use a VPN, creating an encrypted tunnel between your computer and a third-party server, preventing snoopers from intercepting information enroute.

Source

Tags

Wireless Security

You May Also Like

Recent News

Friday, November 29th

Tuesday, November 19th

Friday, November 8th

Friday, November 1st

Tuesday, July 9th

Wednesday, July 3rd

Friday, June 28th

Thursday, June 27th

Thursday, June 13th

Wednesday, June 12th

Tuesday, June 11th