Crowded places like conference centers, train stations, airports, and concerts are perfect places for a hacker to take advantage of any and all Wi-Fi attack vectors.
Most Recent Videos
When an authorized client connects to an external neighboring access point, bypassing the company’s perimeter security and security restrictions set by the firewall.
Any client previously connected to a rogue access point or other malicious access point within the range of a private network is considered a rogue client.
A peer-to-peer Wi-Fi connection between clients that lets two+ devices communicate with each other directly, circumventing network security policies and making the traffic invisible.
An evil twin access point will mimic a legitimate access point, spoofing its SSID and unique MAC address.
A rogue access point is a wireless access point that has been installed on a secure network without explicit authorization from an administrator.
In networks where new access points are being deployed, it can be easy for network administrators to accidentally make a configuration mistake and leave default settings unchanged.
A Trusted Wireless Environment is a framework for building a complete Wi-Fi network that is fast, easy to manage, and most importantly, secure.