Evil twin

In this cyber criminal trick, reputable wireless Internet access points (W-LAN) are replaced by malicious clones that look the same as their twin and often boast a stronger signal. When connected through this network, the data sent and received can be read by cyber criminals.

Our tip: Evil twins are hard for outsiders to see. Therefore, only use outside networks if you have no alternatives. While using a third party W-LAN, you should not enter any critical information, such as login information or payment details. Alternatively, you can install a VPN program (VPN - Virtual Private Network) or have it set up by your IT representative. With a private network, you can surf the Internet safely.

Any questions?
We are here for you.

Arrange a free consultation with our IT security experts. We look forward to meeting you.

+49 030/95 999 80 80 (Mon - Fri 09:00am - 6:00pm)