Digital Edition

SYS-CON.TV
Cirond Corporation Warns of New Wireless Security Danger
Beware of WiPhishing

Cirond Corporation (OTCBB:CROO) warned of a new and growing danger facing users of wireless-equipped laptop computers and companies whose employees use these devices. The company calls this threat "WiPhishing" (pronounced "why fishing") and it is serious enough that it can expose all the shared information on a user's laptop computer -- and potentially even information on traditional wired computer networks -- to wireless "hacking" by criminals intent on stealing the user's personal information and introducing computer viruses, worms or even "keystroke loggers" onto the laptop. These WiPhishing hackers don't even have to be in the same building as the victim -- wireless network technology can allow them to "attract" wireless-equipped laptops from across the street or even the parking lot.

"We call WiPhishing the act of covertly setting up a wireless-enabled laptop or access point for the purpose of getting wireless laptops to associate with it," explained Mr. Miller. "Hackers who are on a "WiFishing expedition" may set the name of their rogue wireless access point (or laptop) to an SSID (ie. wireless network name) that is commonly used by wireless laptop users. The wireless network software can then cause the user's wireless laptop to automatically connect to hacker's wireless access point or wireless-equipped laptop. They will seek to attract people whose home networks may be set to common default SSID names such as Linksys, Netgear, SMC, Wireless -- or a hotspot with an SSID such as T-Mobile, Wayport or FatPort. Hackers are also likely to increasingly post common SSID names on their Web sites as this practice gains momentum."

About Wireless News Desk
WBT News Desk brings you all the latest and greatest news from the world of wireless business and technology, including breaking news, technical articles and feature stories written by the world's leading experts of mBusiness.

In order to post a comment you need to be registered and logged in.

Register | Sign-in

Reader Feedback: Page 1 of 1



ADS BY GOOGLE
Subscribe to the World's Most Powerful Newsletters

ADS BY GOOGLE

The explosion of new web/cloud/IoT-based applications and the data they generate are transforming ou...
CI/CD is conceptually straightforward, yet often technically intricate to implement since it require...
Containers and Kubernetes allow for code portability across on-premise VMs, bare metal, or multiple ...
Enterprises are striving to become digital businesses for differentiated innovation and customer-cen...
Digital Transformation: Preparing Cloud & IoT Security for the Age of Artificial Intelligence. As au...
DevOps is often described as a combination of technology and culture. Without both, DevOps isn't com...
The now mainstream platform changes stemming from the first Internet boom brought many changes but d...
DXWorldEXPO LLC announced today that All in Mobile, a mobile app development company from Poland, wi...
DXWorldEXPO LLC announced today that Ed Featherston has been named the "Tech Chair" of "FinTechEXPO ...
Chris Matthieu is the President & CEO of Computes, inc. He brings 30 years of experience in developm...
Bill Schmarzo, author of "Big Data: Understanding How Data Powers Big Business" and "Big Data MBA: D...
Andi Mann, Chief Technology Advocate at Splunk, is an accomplished digital business executive with e...
In this presentation, you will learn first hand what works and what doesn't while architecting and d...
The Internet of Things is clearly many things: data collection and analytics, wearables, Smart Grids...
To Really Work for Enterprises, MultiCloud Adoption Requires Far Better and Inclusive Cloud Monitori...
We are seeing a major migration of enterprises applications to the cloud. As cloud and business use ...
If your cloud deployment is on AWS with predictable workloads, Reserved Instances (RIs) can provide ...
Disruption, Innovation, Artificial Intelligence and Machine Learning, Leadership and Management hear...
We build IoT infrastructure products - when you have to integrate different devices, different syste...
Consumer-driven contracts are an essential part of a mature microservice testing portfolio enabling ...