Month: October 2017


Do You Have The Right Protection To Mitigate Against Cyber Threats

8. Waterhole attacks are when hackers take advantage of the face that their targeted victims often meet or work at particular physical or virtual location. So they “poison” that location to achieve malicious objective. Fake WiFi is used in such attacks. Hackers setup fake open WiFi access points that can be enticing to someone looking for a hot spot.  By setting up a fake WAP (Wireless Access Point) fake system hackers can  sniff unprotected data that transferred between the victims and their remote hosts/websites to get your login and password.