this post was submitted on 28 Nov 2025
18 points (100.0% liked)

Pulse of Truth

1746 readers
73 users here now

Cyber Security news and links to cyber security stories that could make you go hmmm. The content is exactly as it is consumed through RSS feeds and wont be edited (except for the occasional encoding errors).

This community is automagically fed by an instance of Dittybopper.

founded 2 years ago
MODERATORS
 

A 44-year-old man was sentenced to seven years and four months in prison for operating an "evil twin" WiFi network to steal the data of unsuspecting travelers at various airports across Australia. [...]

top 4 comments
sorted by: hot top controversial new old
[–] AllNewTypeFace@leminal.space 7 points 3 days ago (1 children)

That’s why you should always use a trustworthy VPN when on any network you can’t vouch for.

[–] Nawor3565@lemmy.blahaj.zone 10 points 3 days ago (1 children)

A VPN would not have helped with this. People connecting to the decoy wifi network were redirected to phishing pages that they willingly gave their info to. HTTPS was still present, the criminal still could not have intercepted information that wasn't input into the phishing page. With a VPN, you would have still been redirected exactly the same way.

[–] piccolo@sh.itjust.works 4 points 3 days ago (1 children)

If the vpn offered its own dns, then it would never used the compromised dns.

[–] Shadow@lemmy.ca 5 points 3 days ago

You generally have to accept the captive portal pages before your vpn connection will be allowed.