In this cyber criminal trick, reputable wireless Internet access points (W-LAN) are replaced by malicious clones that look the same as their twin and often boast a stronger signal. When connected through this network, the data sent and received can be read by cyber criminals.
Our tip: Evil twins are hard for outsiders to see. Therefore, only use outside networks if you have no alternatives. While using a third party W-LAN, you should not enter any critical information, such as login information or payment details. Alternatively, you can install a VPN program (VPN - Virtual Private Network) or have it set up by your IT representative. With a private network, you can surf the Internet safely.