Skip to main content

ARP spoofing - Wireless Security

posted onDecember 13, 2001
by hitbsecnews

Think you've got a secure wireless connection to a trusted party? Don't be too sure. Attackers can use a technique known as ARP spoofing to convince two machines that they are communicating with each other, when both are actually connected to a third computer under hostile control. IBM developerWorks article

This is nothing new, but an interesting article nevertheless.

Source

Tags

Wireless

You May Also Like

Recent News

Friday, November 29th

Tuesday, November 19th

Friday, November 8th

Friday, November 1st

Tuesday, July 9th

Wednesday, July 3rd

Friday, June 28th

Thursday, June 27th

Thursday, June 13th

Wednesday, June 12th

Tuesday, June 11th