Crowded places like conference centers, train stations, airports, and concerts are perfect places for a hacker to take advantage of any and all Wi-Fi attack vectors. Watch the videos below to learn how you can protect yourself from these Wi-Fi threats.
Rogue Access Point
Allows attackers to bypass perimeter security.
Delivers malware payloads to the network after connecting to malicious APs.
Neighbor Access Point
Risks infection from connecting to other SSIDs while in range of the authorized AP.
Uses peer-to-peer connections to evade security controls and risk exposure to malware.
“Evil Twin” Access Point
Lures users to connect to it so as to spy on traffic, steal data and infect systems.
Misconfigured Access Point
Opens networks to attack as a result of configuration errors.