Categories
Business & Technology

How do you know it's an evil twin?

<![CDATA[So now we should be aware of network services hijacks in public hotspots, so-called “Evil Twin” network access points that look like the service you expect to find when you look for available networks but that capture confidential data transmitted by your computer (e.g., credit card numbers, passwords, etc.) But it’s simple to tell the […]

<![CDATA[So now we should be aware of network services hijacks in public hotspots, so-called “Evil Twin” network access points that look like the service you expect to find when you look for available networks but that capture confidential data transmitted by your computer (e.g., credit card numbers, passwords, etc.)
But it’s simple to tell the evil twin: It’s the network with the goatee. Just ask Mr. Spock.]]>

2 replies on “How do you know it's an evil twin?”