Rogue AP/Evil Twin Overview

Wi-Fi Snippets

Excerpt From Wi-fi Vulnerabilities part 1 Webinar

CTO Dr. Brett Walkenhorst Elaborates on Authentication Cracking Rogue AP/Evil Twin.

The video below is an explanation of network security’s use of rogue access points and evil twin attacks, as well as an example of their effects through a real-world event in the financial services sector. Dr. Brett Walkenhorst, CTO, clarifies the differences between evil twins and rogue access points. See overviews of mitigating techniques in the video below. These techniques include using a VPN, updating devices, implementing good security practices, HTTPS encryption, mutual authentication, and keeping an eye on Wi-Fi traffic for detection and reaction.

Rogue AP/Evil Twin Overview — Bastille

For more on Wireless Threat Intelligence:

For more information: