Wireless Intercept and "Wiphishing"
The growing availability of wireless technology for computers has brought about new security concerns.
Wireless transmission intercepts, in which unencrypted wireless network traffic is intercepted and confidential information compromised.
- "WiPhishing" (pronounced "why fishing") involves covertly setting up a wireless-enabled laptop or access point in order to get wireless-enabled laptops to connect with it as a prelude to hacking attacks. Some WiPhishing access points download viruses, worms, and keyloggers, while others are used to intercept network traffic in order to intercept sensitive information such as userids and passwords or credit card numbers.
- Rogue wireless access points involves a wireless base station that is set up on a University network without permission. Rogue wireless access points typically allow for wireless transmission intercepts as well as circumvent network security controls like firewalls that protect the University from hackers, worms, and other computer threats.
When using wireless network connections on campus, use only University-supported web access points. The University's Wireless PittNet network requires authentication of end users before University network resources can be accessed.
Learn more about the University's Wireless PittNet service.