`........is an attack type for a rogue Wi-Fi access point that appears to be a legitimate one offered on the premises, but actually has been set up to eavesdrop on wireless communications. It is the wireless version of the phishing scam. An attacker fools wireless users into connecting a laptop or mobile phone to a tainted hotspot by posing as a legitimate provider. This type of attack may be used to steal the passwords of unsuspecting users by either snooping the communication link or by phishing, which involves setting up a fraudulent web site and luring people there.`
Fill in the blank with appropriate choice.
Daniel8660
6Â months, 3Â weeks agodinonino
9Â months, 3Â weeks agoAbdullahK1997
1Â year, 9Â months agosam422
2Â years, 1Â month agojenna339
2Â years, 1Â month ago