There are many advantages to using wireless networking. However, this kind of technology comes with a host of threats and vulnerabilities that hackers can take advantage of. Since information is sent over the…
Read moreIn this article we’ll be setting up a Fake Access Point. As you know, Access Points or routers transmit their WiFi network(s) with a SSID. Some of these names can be very common….
Read moreIn the good old days, Internet access was a privilege of the few and many used to try getting access by all means possible. A common way to achieve unauthorized access was war…
Read moreWireless networks that are run in the home, office, cafes, and pretty much anywhere are also avenues for hacking. Back in the day, WiFi networks were kept open. That means if you had…
Read more