O'Reilly logo

Hacking Wireless Access Points by Jennifer Kurtz

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 4

Hacks Against Individuals

Abstract

Many of the successful cyberattack cases examined by security industry specialists and the media featured social engineering as an integral components of the attack process. In a complex attack that combines technical expertise with social engineering, the latter is especially critical during the reconnaissance phase. In addition to being susceptible to social engineering, individuals often purchase less robust products. Few consumer-grade devices, including home wireless routers, have sufficient security built in. Gartner projects that the number of connected devices will reach 20 billion by 2020. This includes fixed devices (e.g., home appliances) and mobile devices (e.g., fitness trackers and baby ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required