Understanding Wireless Intercept and "WiPhishing"

Overview

 

The growing availability of wireless technology for computers has brought about new security concerns.

Wireless transmission intercepts, in which unencrypted wireless network traffic is intercepted and confidential information compromised.

  • "WiPhishing" involves covertly setting up a wireless-enabled laptop or access point in order to get devices to connect with it as a prelude to hacking attacks. Some download viruses, worms, and keyloggers, while others intercept network traffic in order to obtain sensitive information such as user IDs, passwords, or credit card numbers.
  • Rogue wireless access points involves a wireless base station that is set up on a University network without permission. Rogue wireless access points typically allow for wireless transmission intercepts, circumventing network security controls like firewalls that protect the University from hackers, worms, and other threats.

When using wireless network connections on campus, use only University-supported web access points. The University's PittNet Wi-Fi network requires authentication of end users before University network resources can be accessed.

Learn more about the University's PittNet Wi-Fi service.

 

Request Help Print Article

Related Services / Offerings (1)

SECURITY CONSULTING AND EDUCATION KnowBe4 provides security awareness resources to train, promote and reinforce information security best practices.