Skip to main content
  • Login
  • Subscribe
  • home
  • news
    • Daily News
    • Press Releases
    • Events
  • features
    • Expert Opinions
      • Executive Interviews
      • Opinion/byline
    • Analyst Comments
      • Executive Interviews
      • Opinion/byline
    • Videos
      • Executive Interviews
      • Product launches/Event coverage
      • Webinars
      • Video Tutorials
    • Blogs
  • taxonomy
    • cloud storage
    • storage and virtualization
    • Network storage
    • Data backup
    • Data Protection
    • Data storage management
    • Storage strategy
    • Big Data
  • research
    • Learning Guides
    • White Papers
    • Case Studies
    • Vendor Pages
    • Discussion groups

Advertisement Here

Advertisement

Looking for something else?

Search form

Home » Features »Expert Opinions - Opinion/byline

Wi-fi Phishing Explained

DSA Editorial
Oct 22, 2018
0
Keywords:
Wi-fi Phishing; Wi-fi Security

Wifi Phishing is when cyber criminals create a malicious WiFi access point that appears similar or identical to a legitimate WiFi access point. This malicious WiFi access point is sometimes known as the "evil twin". 

Unsuspecting users can be fooled into connecting to the malicious WiFI point in the belief it is the legitimate connection.

Once connected to the cyber criminals' network, the user will still have an internet connection, but the criminal has access to that user’s system.

Because of the open access that wireless networks offer, securing the platform from phishing and many other attacks becomes difficult. Individuals who are not aware of proper security protocols when accessing a WiFi connection, will easily be made a victim to phishing attacks.

Cyber Criminals looking to target a specific organisation can discover the names of WiFi access points for that corporation and create phishing WFi points that aim to fool employees from that specific company into connecting.
In order to protect themselves from these attacks, both individuals and organisations need to look at adopting some basic preventive steps such as-

  • 2 factor authentications.

  • Protection against Man-in the-Middle attacks

  • Protection against Rogue attacks

  • Protection against Evil Twin attacks

To know more about how to better protect yourself or your organisation from WiFi phishing, click this link

You might also like
  • Archiving Data to the Cloud
  • Flashforward: Heralding the Advent...
  • In Pursuit of 1.6T Data Centre...
  • How the Kepler Project is Working to...
  • Three Steps to Unlock Data Barriers...
Most comment
  • Discussing Data Reduction Interview Series with Arcserve
  • Discussing Data Reduction Interview Series with Dell EMC
  • Discussing Data Reduction Interview Series with Quantum
  • Discussing Data Reduction Interview Series with Exagrid
  • Optimising for Success: The New Economics of IT Post-Pandemic
  • Top Business Intelligence (BI) Trends for 2017
  • Making Your Business for Today and Tomorrow
  • All Flash Power Savings Explained
  • As we bid farewell to 2016, what will 2017 have in store for businesses and technology?
  • Where Finance can use Big Data to mine new opportunities
share us your thought

0 Comment Log in or register to post comments

Tweet
Tweets by DSAnewsportal
Advertisement

Advertisement Here

Advertisement

  • Home
  • News
  • Features
  • Research
  • Bloggers
  • Big Data
  • Cloud Storage
  • Storage And Virtualization
  • Network Storage
  • Data Backup
  • Data Protection
  • Data Storage Management

  • Storage Strategy
  • Privacy
Copyright © 2023 Asia Online Publishing Group Sdn. Bhd. Reproduction in whole or in part is prohibited. Please send any technical comments or questions to our webmaster.