To see how financial institutions, like AAFCU, can monitor the behavior of user and non-user devices register for Great Bay Software's upcoming webinar "Detecting & Protecting Against MAC Spoofing
Attacks" on April 20th, 2016 at 1pm CDT >> Register now.
In addition, a blogger can achieve an anonymous MAC address without purchasing anything and with minimal computer knowledge by a process known as MAC spoofing
Attacks such as MAC spoofing
and denial of service can be launched selectively on a client or an AP for potentially disrupting the entire WLAN.
As part of the implementation, engineers also added security measures to go beyond the wireless and networking equipment's standard protections, shielding Mobile's Wi-Fi users against identity theft, MAC spoofing
and other threats.
In response to MAC spoofing
, another method has evolved, providing more reliable results.
With MAC spoofing
, wireless hacking, and unapproved connections constantly bombarding today's wireless networks, AirMagnet's products are a valuable weapon in the armament available to IT professionals," notes Frost & Sullivan Research Analyst James Brehm.
New security and policy features to protect against MAC spoofing
and avoid static IP address mapping of web destinations
The wireless attacks we saw--jamming, de-authentication, denial-of-service, MAC spoofing
, fake and soft APs--were to be expected, particularly at a hacker conference," said Bruce Hubbert, an AirMagnet engineer who attended DefCon.
320 cases of MAC spoofing
likely used for malicious activity