Wi-Fi network hackers aim to rich people to rob
The wireless Internet access point in the business center is the place where the handsome guys or stylish girls surf the web on expensive laptops and PDAs. They are wealthy and they are targets of remote bandits, specializing in sensitive personal information.
The wireless Internet access point in the business center is the place where the handsome guys or stylish girls surf the web on expensive laptops and PDAs. They are wealthy and they are targets of remote bandits, specializing in sensitive personal information.
Crime of this type is called the "evil twin" because they can entice users into a seemingly safe area but actually impersonate an orthodox site with the name same.
" But even if you access the site safely and legally, hackers can still attack with free online software ," said Ryan Purita, a security expert with Totally Connected Security. .
" ID or password on MySpace page doesn't mean much, " said Richard Rushing, technical director of AirDefense security firm. " Instead, they will steal the bank account password from the computer of those who have a slick appearance ."
Rushing said the crime was recent or in the first-class lobby on the international airport, in a garage with expensive cars and Wi-Fi equipment. The railway station corridor is also their goal.
VPN virtual private network can be used to limit the loss of information when accessing Wi-Fi. You can refer to some articles on Network Administration to learn more about wireless security.
- Basics of network devices
- 11 -9 on the network
- It turns out this is the reason why rich people get married with other rich people
- Secrets of Korean hackers
- Many network systems in Vietnam can be seriously affected by Webmin's error
- Protect WiFi network before hackers
- The secret of wealth
- Many hackers voiced criticism of DDoS evils
- See network security struggles like the front
- Attacks network by homemade aircraft
What is the Snapdragon SiP chip? How to create a yellow circle around the mouse cursor on Windows Edit the Boot.ini file in Windows XP 3 ways to restart the remote computer via the Internet Vietnam computer market: Looking back a year How to restore deleted applications on Android How to increase the capacity of C drive on Windows 10, 8, 7 ... 8 security features of Windows operating system