Learned a new term today from the wireless world: evil twin.
As easy as it is for you to to "borrow" someone else's wireless signals, hackers can also create hotspots that spoof legitimate ones to suck data from your laptops.
Miulang
As easy as it is for you to to "borrow" someone else's wireless signals, hackers can also create hotspots that spoof legitimate ones to suck data from your laptops.
When people are using wireless networks found in public places such as shops and cyber cafes, attackers can mimic the characteristics of the legitimate wireless network. As a result, hotspot users can unknowingly connect to the attacker's computer (sometimes referred to as an "Evil Twin") instead of the intended wireless network.
Madigan said that attackers operating Evil Twins can hijack data, such as passwords and credit card information, and deploy malicious computer codes. Evil Twins even can control which Web site appears when the user accesses the Internet, often mimicking the user's intended Web site to capture their private information.
Madigan said that attackers operating Evil Twins can hijack data, such as passwords and credit card information, and deploy malicious computer codes. Evil Twins even can control which Web site appears when the user accesses the Internet, often mimicking the user's intended Web site to capture their private information.