Well, so do not use public wifi network

You know what they say: the well-known and has reformed hacker demonstrated how easy it is to steal data from users of public WiFi and then take control of their machines.
Whether it's a park, mall or airport, connected to a public Wi-Fi, a moment not feel safe in ourselves. And someone says (and demonstrate), who has long been a dark side: Kevin Mitnick, the notorious hacker who is now a recognized security expert.

Mitnick there are three simple steps to be obtained by the public WiFi users data. First of all, to create a fake wifi network (in this presentation, "Telstra Air"). If you log in to this one, you can already record keyboard keystrokes, and thus has become the user names, passwords and other personal information available.

If the hacker also sent fake updates to the machine that you installed the unsuspecting victim, you'll gain control over the computer. In addition, according to Mitnick, the hacker necessary tools to those mentioned are all there on the net, and even a school is able to use these - reported in the Mail Online , the assistance given to the video, which the hacker demonstrates the above.

See Video:   http://hvg.hu/tudomany/20160901_kevin_mitnick_nyilvanos_wifi_veszelyei

Source: hvg.hu

Topics: Social Engineering, Speaking Engagements, fake network, penetration testing, cyber security, keystrokes, Password Management, phishing demonstrations, public Wi-Fi, security consultant, malware, Spam, user names, cybercrime, personal data, Kevin Mitnick

Latest Posts

Kevin offers three excellent presentations, two are based on his best-selling books. His presentations are akin to technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness.”

AI Voice Cloning: What It Is, and How to Detect Threats

Artificial Intelligence (AI) has reshaped our lives, speeding up learning, content creation, and communication. But with innovation comes a new risk: ..

Read more ›

3 Types of Hacking Seen In 2024 and Predictions For 2025

Threat actors are typically after two things from your business: data or money. Usually, they’re motivated by both, as data can help them cash in at t..

Read more ›

6 Types of Social Engineering Attacks and How to Prevent Them

Social engineering attacks account for a massive portion of all cyber-attacks.

Read more ›
tech-texture-bg