Language Selection

English French German Italian Portuguese Spanish

Does Your Wi-Fi Hotspot Have an Evil Twin?

Filed under
Security

Identity thieves are going wireless in their quest to steal your personal info.

You may want to think twice before logging into a public wireless hotspot. Sure, grabbing a few minutes of connectivity is convenient, but identity thieves are discovering that, through "evil twin" attacks, hotspots are a great way to steal unsuspecting users' private information. So how does an evil twin attack work?

Let's say that I'm a hacker. I set up my computer to transmit a signal that turns my PC into an access point, or Wi-Fi hotspot. I'll even give it a legitimate-sounding name, like T-Mobile Hotspot, to fool unsuspecting surfers.

Next, I put my laptop in a backpack and read a newspaper while sipping some java at the local coffee shop. All I have to do is wait for you to connect. (And if I'm looking to steal from you, I'll require you to enter a credit card number to get access, just like T-Mobile does--then I'll have your credit card information.) While you surf the Web, my computer redirects you to Web pages I have created that happen to look like the ones you visit on a daily basis.

In fact, the only difference between the Citibank page you visit every day and the one I have made is that my page is unencrypted. I can log all of the information you input into various Web forms, and when you check your e-mail, I can read it along with you.

Full Story.

More in Tux Machines

SystemRescueCd 4.5.2 Out Now with GParted 0.22.0 and NetworkManager 1.0.0

François Dupoux has announced today, March 30, the second maintenance release for his popular SystemRescueCd 4.5 Linux kernel-based Live CD operating system that can be used by system administrators for all sorts of system rescue and recovery tasks. Read more

10 beautiful Android Wear watch face packs

Unlike a smartwatch, A high-quality traditional watch doesn't need to be recharged on a daily basis. Also, it will likely be perfectly useful decades after its purchase, while a smartwatch isn't likely to endure the tests of time very well. But can you change a classic watch's face? Nope, we don't think so. The ability to personalize an Android Wear smartwatch is cool indeed, and the collection of third-party watch faces available at the Play Store is growing steadily. Some are functional and feature-packed, others aim to deliver the best visual experience. The 10 Android Wear watch face packs we have below belong to the latter category. Check them out! Read more

HandyLinux 2.0 Beta Now Available for Download, Based on Debian 8 Jessie - Screenshot Tour

The availability of the Beta version of the upcoming HandyLinux 2.0 computer operating system has been announced today, March 30, on the distribution’s website, which has been redesigned to match the look and feel of the OS. Read more

DebEX Barebone Is the First Debian 8 Jessie Live CD with Xfce 4.12

Arne Exton had the pleasure of informing Softpedia earlier today, March 29, about the immediate availability for download of a new build (150329) of his DebEX Barebone computer operating system derived from the upcoming Debian GNU/Linux 8 Jessie distribution and built around the recently released Xfce 4.12 desktop environment. Read more