Here's an interesting question someone asked me the other day - my networking knowledge isn't sufficient to answer...
A friend was in the park with his WiFi enabled laptop and notices he can get a connection so is happily browsing away. He's just about to log into his online banking when he thinks a very valid point - who else may be able to see his user details?
I'm not sure how much control a network administrator may have in terms of the ability to check whats going on - I guess it would be trival for someone with the right logging software running to see what sites my friend had visited, how long he was there etc. Would it also have been possible to have e.g. put a key logger onto his PC?
Just wondering if the next evolution of 'phishing' emails is going to be people deliberately leaving unsecured WiFi open to obtain peoples details?
A friend was in the park with his WiFi enabled laptop and notices he can get a connection so is happily browsing away. He's just about to log into his online banking when he thinks a very valid point - who else may be able to see his user details?
I'm not sure how much control a network administrator may have in terms of the ability to check whats going on - I guess it would be trival for someone with the right logging software running to see what sites my friend had visited, how long he was there etc. Would it also have been possible to have e.g. put a key logger onto his PC?
Just wondering if the next evolution of 'phishing' emails is going to be people deliberately leaving unsecured WiFi open to obtain peoples details?