The Real Hustle: The WiFi Scam

McLovin

Level 76
Verified
Honorary Member
Malware Hunter
Apr 17, 2011
9,224
I think it's a bit stupid, they would of realised something is wrong when connecting to the laptop network. Why would you need to put in personal credit card information, just to access the internet, something doesn't seem right. I would of either used the hotel's network or I would of used my own phone internet.
 

Tom172

Level 1
Thread author
Feb 11, 2011
1,009
McLovin said:
I think it's a bit stupid, they would of realised something is wrong when connecting to the laptop network. Why would you need to put in personal credit card information, just to access the internet, something doesn't seem right. I would of either used the hotel's network or I would of used my own phone internet.

Completely agree. I guess the whole point is to show what's theoretically possible.
 

jamescv7

Level 85
Verified
Honorary Member
Mar 15, 2011
13,070
99% of Wifi access points does not have a credit card information so a user must be suspicious about giving a credit card and wondered why its needing it when others does not.

Two ways to access the Wifi are: enter the password or access through the access point without password.

Also its a make sense when written to be Free Wifi Hotspot then entering your credit card. Well halted on that operation before to proceed.
 

McLovin

Level 76
Verified
Honorary Member
Malware Hunter
Apr 17, 2011
9,224
That's what we have here, we have to connect via password to access it and we also have mac filtering on it as well.
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top