• Discounts and special offers
  • Subscriber-only articles and interviews
  • Breaking news and trending topics

Already a subscriber?

By signing up, you accept Moneywise's Terms of Use, Subscription Agreement, and Privacy Policy.

Not interested ?

Why evil twin attacks are successful

Police allege the man used a portable wireless device to create evil twin Wi-Fi networks at multiple locations. These attacks commonly occur at places we connect to Wi-Fi, such as coffee shops and airports, because users trust that their devices are safe there. So comfortable are people when visiting these places, they often don’t think twice about connecting to the internet.

That’s where the danger begins. According to NordVPN, an attacker who wants to get your information will set up their own hotspot with a similar or identical name as the authentic access point — thus becoming the “evil twin.” From there, they count on users connecting to the imposter signal.

Once connected, a user’s activity can be monitored and recorded. If you were to connect to a social media account, then check a transaction at the bank, followed by texting a family member, the attacker may be able to see all of that, and now they have several pieces of personally identifiable information about you. This information can be used to break into your financial accounts or be put up for sale on the “dark web.”

Discover how a simple decision today could lead to an extra $1.3 million in retirement

Learn how you can set yourself up for a more prosperous future by exploring why so many people who work with financial advisors retire with more wealth.

Discover the full story and see how you could be on the path to an extra $1.3 million in retirement.

Read More

Safeguarding yourself from an attack

While evil twin attacks are a real threat, there are steps you can take to prevent yourself from becoming a victim. The first thing to do is be aware of your digital surroundings and always double check a network ID matches the one named by the venue. It may also be wise to disable auto-connect for networks or even turn off the Wi-Fi feature on your phone or laptop when you’re not using it.

If you don’t recognize the login process for a network you are used to connecting to, might not be legitimate. Ask an employee to confirm if you suspect anything. A legitimate network won’t ask you to log in using your email or social media accounts to access the internet.

In addition, using different passwords for different websites can help reduce your overall risk of having sensitive information stolen. It’s also a good idea to use multifactor authentication where available.

Should you suspect that you’ve been a victim of an evil twin attack, the first step is to disconnect from the network immediately. Change any affected passwords to help prevent unauthorized access to your personal accounts. It’s also a good idea to monitor your accounts for any suspicious activity afterward, just in case.

Sponsored

This 2 minute move could knock $500/year off your car insurance in 2024

OfficialCarInsurance.com lets you compare quotes from trusted brands, such as Progressive, Allstate and GEICO to make sure you're getting the best deal.

You can switch to a more affordable auto insurance option in 2 minutes by providing some information about yourself and your vehicle and choosing from their tailor-made results. Find offers as low as $29 a month.

Joe Cortez Freelance contributor

Joe Cortez is a freelance contributor to Moneywise.

Disclaimer

The content provided on Moneywise is information to help users become financially literate. It is neither tax nor legal advice, is not intended to be relied upon as a forecast, research or investment advice, and is not a recommendation, offer or solicitation to buy or sell any securities or to adopt any investment strategy. Tax, investment and all other decisions should be made, as appropriate, only with guidance from a qualified professional. We make no representation or warranty of any kind, either express or implied, with respect to the data provided, the timeliness thereof, the results to be obtained by the use thereof or any other matter. Advertisers are not responsible for the content of this site, including any editorials or reviews that may appear on this site. For complete and current information on any advertiser product, please visit their website.