Hackers are able to easily exploit vast security vulnerabilities inherent in most public hotspot deployments. What follows are four specific security vulnerabilities along with “best practice” recommendations to overcome them. Wade McMunn, President of Wireless Internet Provider – 82nd Street Wireless, gives guidance on the issues.
An “evil twin” can be a laptop in a hacker’s backpack set-up to trick users into logging onto the Internet via their “rogue” connection by mimicking the legitimate hotspot’s network name and login page (where applicable). Once logged on, the hacker can create fake login prompts for popular email and banking applications thereby stealing the user’s most valued login credentials.Read Full Story