Why evil twin attacks are successful
Police allege the man used a portable wireless device to create evil twin Wi-Fi networks at multiple locations. These attacks commonly occur at places we connect to Wi-Fi, such as coffee shops and airports, because users trust that their devices are safe there. So comfortable are people when visiting these places, they often don’t think twice about connecting to the internet.
That’s where the danger begins. According to NordVPN, an attacker who wants to get your information will set up their own hotspot with a similar or identical name as the authentic access point — thus becoming the “evil twin.” From there, they count on users connecting to the imposter signal.
Once connected, a user’s activity can be monitored and recorded. If you were to connect to a social media account, then check a transaction at the bank, followed by texting a family member, the attacker may be able to see all of that, and now they have several pieces of personally identifiable information about you. This information can be used to break into your financial accounts or be put up for sale on the “dark web.”
Discover how a simple decision today could lead to an extra $1.3 million in retirement
Learn how you can set yourself up for a more prosperous future by exploring why so many people who work with financial advisors retire with more wealth.
Discover the full story and see how you could be on the path to an extra $1.3 million in retirement.
Read MoreSafeguarding yourself from an attack
While evil twin attacks are a real threat, there are steps you can take to prevent yourself from becoming a victim. The first thing to do is be aware of your digital surroundings and always double check a network ID matches the one named by the venue. It may also be wise to disable auto-connect for networks or even turn off the Wi-Fi feature on your phone or laptop when you’re not using it.
If you don’t recognize the login process for a network you are used to connecting to, might not be legitimate. Ask an employee to confirm if you suspect anything. A legitimate network won’t ask you to log in using your email or social media accounts to access the internet.
In addition, using different passwords for different websites can help reduce your overall risk of having sensitive information stolen. It’s also a good idea to use multifactor authentication where available.
Should you suspect that you’ve been a victim of an evil twin attack, the first step is to disconnect from the network immediately. Change any affected passwords to help prevent unauthorized access to your personal accounts. It’s also a good idea to monitor your accounts for any suspicious activity afterward, just in case.
This 2 minute move could knock $500/year off your car insurance in 2024
OfficialCarInsurance.com lets you compare quotes from trusted brands, such as Progressive, Allstate and GEICO to make sure you're getting the best deal.
You can switch to a more affordable auto insurance option in 2 minutes by providing some information about yourself and your vehicle and choosing from their tailor-made results. Find offers as low as $29 a month.