Wireless Hotspot Scam Concerns Security Managers

April 2005
Security: Solutions for Enterprise Security Leaders;Apr2005, Vol. 42 Issue 4, p10
Trade Publication
Reports on the security threats posed by public wireless activity in the U.S. Use of wireless devices by identity and information thieves to impersonate legitimate access points, stealing credit card numbers and corporate or privileged information like client databases; Requirement for a wireless laptop and widely available software to broadcast a radio signal that overpowers the real hot spot in evil twin attacks; Need of security managers to take the potential for intrusion into consideration when drafting such corporate security policies.


Related Articles

  • Risky business. Felber, Bob // Public Relations Tactics;Sep2012, Vol. 19 Issue 9, p7 

    In this article, the author discusses identity theft in the workplace. He says that identity thieves procure personal information through a variety of means including lost or stolen credit cards, stolen paper mail, or computer spyware. He adds that approximately 11.6 million adults became...

  • Your info: At risk everywhere.  // Consumer Reports;Jul2014, Vol. 79 Issue 7, p16 

    The article discusses ways in which personal information and data is susceptible to hackers as of July 2014. Topics include including malware software and electronic mail (e-mail) phishing attacks on personal computers, mobile device malware for Android smartphones, and access to medical forms...

  • Courts. Wolfe, Daniel // American Banker;7/7/2006, Vol. 171 Issue 129, p7 

    The article presents news briefs related to identity theft. Five men, ages 19 to 24, have been arrested and charged with aggravated identity theft. They allegedly used stolen or fraudulently created accounts to search databases for personal information on celebrities. Andrew Montovani, one of...

  • Citigroup Victim of Data Theft in Japan.  // BSA/AML Update;9/1/2011, Vol. 7 Issue 17, p12 

    The article reports that identity thieves have stolen the personal data of 92,408 Citigroup Inc. credit card customers in Japan.

  • When Your Credit Card Gets Compromised at a Hotel. ELLIOTT, CHRISTOPHER // News India Times;2/7/2014, Vol. 45 Issue 6, p26 

    The article offers the author's view on the growing problem of identity fraud that is the perennial concern for travelers and hotel guests who use credit cards while on the road.

  • CHECK, PLEASE! McAnally, Michelle // PMQ Pizza Magazine;May2013, Vol. 17 Issue 4, p50 

    The article focuses on pay-at-table credit card processing systems designed for restaurants and other similar establishments as of May 2013. Background is presented on the increasing risk of credit card data theft at restaurants. Comments by TablePay of America chief operating officer (COO) Tom...

  • The seamless edge. Rash, Wayne // InfoWorld;5/27/2002, Vol. 24 Issue 21, p39 

    Describes the Mobility 3.5 wireless networking security software from NetMotion Wireless. Limitations; Advantages; Requirements for installing the software; Details of the tests on the software.

  • Warehouses Are Going Mobile. Klie, Leonard // Food Logistics;Mar2005, Issue 75, p37 

    Presents several guidelines for the implementation of wireless solutions in warehouses. Assessment of the strength and availability of the airwaves at the facility; Selection of software that will link the wireless system to other systems; Factors that led to the security concerns with wireless...

  • LITAN SAYS BREACHES CAUSE FRAUD UP TICK.  // CardLine;2006, Vol. 6 Issue 20, p37 

    The article reports on a statement by Avivah Litan, a card-fraud expert and an analyst with Gartner Research, on the increase in card-fraud in the U.S. Litan says that the up tick is attributable to crooks getting into databases containing card numbers and using the information to make...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics