
Let’s Make Wi-Fi Security a Global Standard
To advocate for change, we need to share your personal information with the organizations in Our Plan. If you do not want us to do this, please do not sign this petition. Privacy Policy.

The Most Common Wi-Fi Hacks

Rogue
Access Point
Attention retail owners! Hackers can plug in the cheapest AP they could get into the wire closet and hijack POS systems to reveal credit card numbers.

“Evil Twin”
Access Point
Online shopping? Hackers can trick you into connecting to their SSID. When you enter your credit card information at checkout, the hacker has access to it all and is ready to go sell it on the dark web.

Rogue
Client
Your phone remembers Wi-Fi networks that you connected to in the past. You could be bringing malware back to the hospital without your knowledge. And your phone is now considered a Rogue Client.

Neighbor
Access Point
Favorite radio station blocked at work? Connecting to a nearby coffee shop seems painless, but a hacker is just waiting for you to connect to Wi-Fi and get to work on accessing your network.

Misconfigured
Access Point
Leave it to an IT pro to set up and configure your Wi-Fi, otherwise you could leak private company data like a sieve.

Ad-hoc
Network
Always use corporate-approved secure network file sharing! Sending files via AirDrop or AirDroid creates security and legal implication that could impact your business.
“The best way to predict the future is to create it!”
– Denis Gabor

Our Plan
The movement stems from the Trusted Wireless Environment framework that succinctly defines the technology components a Wi-Fi network needs in order to provide high performance, scalable management, and security protection from the six known Wi-Fi threat categories.
These threats are not new and have been around since Wi-Fi went mainstream in 1999. The threats are a reality of the fundamental nature of Wi-Fi: that anyone with a Wi-Fi access point, router, or smartphone can choose whatever SSID network name they’d like to broadcast. This means that anyone can leverage this tactic to steal passwords, access files from various Cloud storage accounts, intercept emails, install malware that monitors the camera and microphone inside your smartphone silently, and much more.
In 2019, we started a movement dedicated to pursuing industry cooperation in building Wi-Fi security standards to protect everyone from these six known Wi-Fi threat categories into all Wi-Fi ecosystem technologies. The Trusted Wireless Environment movement benefits all vendors, service providers, businesses and consumers of Wi-Fi and seeks to solve this massive security problem with technology so that the weakest link in security chain, us (the users), aren’t a part of the equation.
We are dedicated to increasing the availability of secure Wi-Fi connections built on a Trusted Wireless Environment, so Wi-Fi users don’t have to worry about their data being compromised. Every signature that we collect will help us partner with organizations such as the Congressional Wi-Fi Caucus, WiFiForward, PCI Security Standards Council, Wi-FiNOW, IEEE, and Wi-Fi Alliance to name a few. These organizations help build security standards for businesses around the world and we want to join forces by collaborating with them to make this world a safer place.
Trusted Wireless Environment Supporters
The below companies offer secure Wi-Fi connections built on a Trusted Wireless Environment. Join them in making this world a safer place by becoming a Trusted Wireless Environment evangelist. To have your company logo featured on our website, please email your logo to join@TrustedWirelessEnvironment.com