Explore chapters and articles related to this topic
Security in Wireless LAN Mesh Networks
Published in Yan Zhang, Jun Zheng, Honglin Hu, Security in Wireless Mesh Networks, 2008
Masquerading (sometimes referred to as spoofing) occurs when an attacking network device impersonates a valid device. Depending on whether a device is accessing a mesh node using its MAC or IP address, an attacker may either use IP address spoofing or MAC address spoofing. Notorious attacks, such as evil twin attacks, can potentially allow hackers to steal personal information such as credit cards or any personal identity information.
Revealing the relationship between rational fatalism and the online privacy paradox
Published in Behaviour & Information Technology, 2019
Wenjing Xie, Amy Fowler-Dawson, Anita Tvauri
Though SNS is part of the Internet, the security and privacy issues have been especially important on SNS. SNS has been considered as the new generation of the Internet, where people can freely share user-generated content and user data can be reused by others (O'Reilly 2006). Thus, it is easier for third parties to collect more private data such as social relationships, hobbies, and travel compared to other websites such as e-commerce sites (Cecere, Le Guel, and Soulié 2015). Scholars also have identified SNS-specific privacy attacks, such as social media Phishing which happens when attackers use Facebook instead of traditional email to obtain user sensitive personal information (Kumar, Saravanakumar, and Deepa 2016), and Evil Twin attacks, through which attackers can create the Evil Twin account on Facebook, add friends, and get money or gather personal information about other people (Timm and Perez 2010). Moreover, Tuunainen, Pitkänen, and Hovi’s (2009) study indicated that compared to privacy concerns on the Internet in general, people have lower level of privacy concern when using SNSs. One reason could be that Facebook is perceived to be a more manageable network of ‘friends’, who are more trustful. Thus, privacy issues on SNS are worth special attention and this study will study privacy protection on the Internet in general and SNS in particular.
Free Wi-Fi: To Buy or Not to Buy
Published in Journal of Computer Information Systems, 2020
Lakshman Mahadevan, Jeffrey P. Kaleta
Online shopping using free public Wi-Fi has different characteristic than conducting regular searches or surfing. With online shopping, personal information about the consumer is transmitted over a public Wi-Fi network. One of the key vulnerability points in an online transaction is the local infrastructure.9 Free public Wi-Fi is fraught with vulnerabilities to the consumer.10,11 E-Security Planet12 provides a list of top 10 public Wi-Fi security threats that include data interception through the use of packet sniffers13 and evil twin or rouge access points. Weak security provides a variety of opportunities for hackers to exploit the flaws to intercept and decrypt communications passing through wireless links.14
AI-enabled IoT penetration testing: state-of-the-art and research challenges
Published in Enterprise Information Systems, 2023
Claudia Greco, Giancarlo Fortino, Bruno Crispo, Kim-Kwang Raymond Choo
Esser and Serrão (2018) present the ”Evil-Twin Framework” (ETF), a framework for Wi-Fi vulnerability analysis and penetration testing, mainly focused on client-side vulnerabilities, including several functionalities and attacks, such as packet sniffing, custom packet injection, access point creation, and MITM attack.