Previous All Posts Next

Fake WiFi Networks Exposed at the RNC Convention

Posted: July 22, 2016 to Cybersecurity.

Tags: Data Breach, Malware, Cloud Security

By now people should know not to jump on untrusted Wi-Fi networks, but unfortunately there are a lot of people who either still do it. In order to test this out, security researchers at Avast Software went to the Republican National Convention and set up a series of fake Wi-Fi networks. Despite opening themselves up to the possibility of being hacked and having their personal information stolen, thousands logged on. Over the course of one day, the team from Avast set up networks and gave them names like “Xfinitywifi”, “GoogleStarbucks”, and “I vote Trump! Free Internet”. More than 1,200 people connected to the fake networks set up around Quicken Loans Arena and the Cleveland airport, of those 70% had their identities exposed. Most of the people using the free internet were using social networking apps like Facebook or Twitter, messaging apps like Facebook Messenger or WhatsApp, and 10% were browsing the web. Hackers routinely set up these sort of fake Wi-Fi hotspots in order to lure people into jumping on. Once they do, the hacker is able to monitor and intercept any data that is transmitted through it, including web traffic, emails, banking information, or any other personal data that is sent. Most web traffic sent through a browser is typically not encrypted, but even if a secure protocol is used, it’s fairly easy to get around. With that said, apps like Facebook and many others do use encryption by default so unlike information sent through a mobile browser, it’s likely not sent in plain text. It’s easy to avoid this sort of data theft by simply not logging on to a network you don’t know. If you for some reason you have to, avoid using a browser and don’t do anything that involves sending sensitive personal information.

Related Resources

Learn more about how Petronella Technology Group can help:

Need help implementing these strategies? Our cybersecurity experts can assess your environment and build a tailored plan.
Get Free Assessment

About the Author

Craig Petronella, CEO and Founder of Petronella Technology Group
CEO, Founder & AI Architect, Petronella Technology Group

Craig Petronella founded Petronella Technology Group in 2002 and has spent more than 30 years working at the intersection of cybersecurity, AI, compliance, and digital forensics. He holds the CMMC Registered Practitioner credential (RP-1372) issued by the Cyber AB, is an NC Licensed Digital Forensics Examiner (License #604180-DFE), and completed MIT Professional Education programs in AI, Blockchain, and Cybersecurity. Craig also holds CompTIA Security+, CCNA, and Hyperledger certifications.

He is an Amazon #1 Best-Selling Author of 15+ books on cybersecurity and compliance, host of the Encrypted Ambition podcast (95+ episodes on Apple Podcasts, Spotify, and Amazon), and a cybersecurity keynote speaker with 200+ engagements at conferences, law firms, and corporate boardrooms. Craig serves as Contributing Editor for Cybersecurity at NC Triangle Attorney at Law Magazine and is a guest lecturer at NCCU School of Law. He has served as a digital forensics expert witness in federal and state court cases involving cybercrime, cryptocurrency fraud, SIM-swap attacks, and data breaches.

Under his leadership, Petronella Technology Group has served 2,500+ clients, maintained a zero-breach record among compliant clients, earned a BBB A+ rating every year since 2003, and been featured as a cybersecurity authority on CBS, ABC, NBC, FOX, and WRAL. The company leverages SOC 2 Type II certified platforms and specializes in AI implementation, managed cybersecurity, CMMC/HIPAA/SOC 2 compliance, and digital forensics for businesses across the United States.

CMMC-RP NC Licensed DFE MIT Certified CompTIA Security+ Expert Witness 15+ Books
Related Service
Protect Your Business with Our Cybersecurity Services

Our proprietary 39-layer ZeroHack cybersecurity stack defends your organization 24/7.

Explore Cybersecurity Services
Previous All Posts Next
Free cybersecurity consultation available Schedule Now