{"id":5979,"date":"2019-02-12T13:02:45","date_gmt":"2019-02-12T13:02:45","guid":{"rendered":"https:\/\/www.galgus.net\/?p=317"},"modified":"2019-02-12T13:02:45","modified_gmt":"2019-02-12T13:02:45","slug":"concerned-about-wifi-networks-security","status":"publish","type":"post","link":"https:\/\/www.galgus.ai\/en\/blog\/concerned-about-wifi-networks-security\/","title":{"rendered":"Concerned about WiFi networks cybersecurity?"},"content":{"rendered":"<p>Cybersecurity is seen as one of the most important problems. In fact, wireless communication has inherent vulnerabilities as the signals share the electromagnetic spectrum. For network owners and system integrators, ensuring the secrecy and privacy of communications is a major concern when operating a WiFi network. Public networks with high user density, such as those present in convention centers, trains or airports, are the most vulnerable, as they are quite attractive for those who want to make malicious use of WiFi. The most common attacks such as Rogue AP or man-in-the-middle are very easy to carry out with free tools, and are the easiest to deceive unwary users.<\/p>\n<p>A Rogue AP is a wireless access point able to fake one of the legitimate APs on your network. It does so by either cloning the SSID announced by your teams, the MAC address of one of them (BSSID), or even the Beacon frames and web applications used (especially critical with captive portals). These Rogue APs are deployed instantly by people who want your users&#8217; devices to connect to them, thus allowing access to sensitive data (from user login and password, to credit cards).<\/p>\n<p><img fetchpriority=\"high\" decoding=\"async\" class=\"aligncenter size-full wp-image-318\" src=\"https:\/\/www.galgus.net\/wp-content\/uploads\/2019\/02\/IMAGEN-PARA-BLOG-GALGUS.png\" alt=\"\" width=\"640\" height=\"452\" \/><\/p>\n<p>In this context, Galgus has developed and patented Cognitive HotspotTM Technology (CHT), an embedded software that is installed within APs of a wide range of manufacturers to provide them with advanced features. CHT has modules to optimize the network, to reduce energy consumption or to locate devices, but also has modules to detect and mitigate the outbreak of cybersecurity problems such as Rogue APs.<\/p>\n<p><span style=\"color: #dd0031;\"><strong><a style=\"color: #dd0031;\" href=\"https:\/\/www.galgus.net\/get-your-copy\/?post_id=314\">Discover Galgus&#8217; solution to cybersecurity in WiFi networks here!<\/a><\/strong><\/span><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;    \t<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity is seen as one of the most important problems. In fact, wireless communication has inherent vulnerabilities as the signals share the electromagnetic spectrum. For network owners and system integrators, ensuring the secrecy and privacy of communications is a major concern when operating a WiFi network. Public networks with high user density, such as those [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":5613,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[],"tags":[],"class_list":["post-5979","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Concerned about WiFi networks cybersecurity? | Galgus<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.galgus.ai\/en\/blog\/concerned-about-wifi-networks-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Concerned about WiFi networks cybersecurity? | Galgus\" \/>\n<meta property=\"og:description\" content=\"Cybersecurity is seen as one of the most important problems. In fact, wireless communication has inherent vulnerabilities as the signals share the electromagnetic spectrum. For network owners and system integrators, ensuring the secrecy and privacy of communications is a major concern when operating a WiFi network. Public networks with high user density, such as those [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.galgus.ai\/en\/blog\/concerned-about-wifi-networks-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Galgus\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/GalgusCHT\" \/>\n<meta property=\"article:published_time\" content=\"2019-02-12T13:02:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.galgus.ai\/wp-content\/uploads\/2019\/02\/IMAGEN-PARA-BLOG-GALGUS.png\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"452\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"galgus\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@galgus_\" \/>\n<meta name=\"twitter:site\" content=\"@galgus_\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"galgus\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.galgus.ai\/en\/blog\/concerned-about-wifi-networks-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.galgus.ai\/en\/blog\/concerned-about-wifi-networks-security\/\"},\"author\":{\"name\":\"galgus\",\"@id\":\"https:\/\/www.galgus.ai\/en\/#\/schema\/person\/e79bfa60d8df63cbcc4564a89c6e3479\"},\"headline\":\"Concerned about WiFi networks cybersecurity?\",\"datePublished\":\"2019-02-12T13:02:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.galgus.ai\/en\/blog\/concerned-about-wifi-networks-security\/\"},\"wordCount\":272,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.galgus.ai\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.galgus.ai\/en\/blog\/concerned-about-wifi-networks-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.galgus.ai\/wp-content\/uploads\/2019\/02\/IMAGEN-PARA-BLOG-GALGUS.png\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.galgus.ai\/en\/blog\/concerned-about-wifi-networks-security\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.galgus.ai\/en\/blog\/concerned-about-wifi-networks-security\/\",\"url\":\"https:\/\/www.galgus.ai\/en\/blog\/concerned-about-wifi-networks-security\/\",\"name\":\"Concerned about WiFi networks cybersecurity? | Galgus\",\"isPartOf\":{\"@id\":\"https:\/\/www.galgus.ai\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.galgus.ai\/en\/blog\/concerned-about-wifi-networks-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.galgus.ai\/en\/blog\/concerned-about-wifi-networks-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.galgus.ai\/wp-content\/uploads\/2019\/02\/IMAGEN-PARA-BLOG-GALGUS.png\",\"datePublished\":\"2019-02-12T13:02:45+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.galgus.ai\/en\/blog\/concerned-about-wifi-networks-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.galgus.ai\/en\/blog\/concerned-about-wifi-networks-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.galgus.ai\/en\/blog\/concerned-about-wifi-networks-security\/#primaryimage\",\"url\":\"https:\/\/www.galgus.ai\/wp-content\/uploads\/2019\/02\/IMAGEN-PARA-BLOG-GALGUS.png\",\"contentUrl\":\"https:\/\/www.galgus.ai\/wp-content\/uploads\/2019\/02\/IMAGEN-PARA-BLOG-GALGUS.png\",\"width\":640,\"height\":452},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.galgus.ai\/en\/blog\/concerned-about-wifi-networks-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/www.galgus.ai\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Concerned about WiFi networks cybersecurity?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.galgus.ai\/en\/#website\",\"url\":\"https:\/\/www.galgus.ai\/en\/\",\"name\":\"Galgus\",\"description\":\"Expertos en WiFi\",\"publisher\":{\"@id\":\"https:\/\/www.galgus.ai\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.galgus.ai\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.galgus.ai\/en\/#organization\",\"name\":\"Galgus\",\"url\":\"https:\/\/www.galgus.ai\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.galgus.ai\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.galgus.net\/wp-content\/uploads\/2020\/12\/galgus_logo.png\",\"contentUrl\":\"https:\/\/www.galgus.net\/wp-content\/uploads\/2020\/12\/galgus_logo.png\",\"width\":425,\"height\":192,\"caption\":\"Galgus\"},\"image\":{\"@id\":\"https:\/\/www.galgus.ai\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/GalgusCHT\",\"https:\/\/x.com\/galgus_\",\"https:\/\/www.instagram.com\/galgus\/\",\"https:\/\/www.linkedin.com\/company\/11042569\/\",\"https:\/\/www.youtube.com\/channel\/UC-YtD_RCpb4X8hvalKLv02g\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.galgus.ai\/en\/#\/schema\/person\/e79bfa60d8df63cbcc4564a89c6e3479\",\"name\":\"galgus\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.galgus.ai\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/512273c964661efe4018078bedf71de7a38c3f34e4344954d21c4ed7a4cfcba6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/512273c964661efe4018078bedf71de7a38c3f34e4344954d21c4ed7a4cfcba6?s=96&d=mm&r=g\",\"caption\":\"galgus\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Concerned about WiFi networks cybersecurity? | Galgus","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.galgus.ai\/en\/blog\/concerned-about-wifi-networks-security\/","og_locale":"en_US","og_type":"article","og_title":"Concerned about WiFi networks cybersecurity? | Galgus","og_description":"Cybersecurity is seen as one of the most important problems. In fact, wireless communication has inherent vulnerabilities as the signals share the electromagnetic spectrum. For network owners and system integrators, ensuring the secrecy and privacy of communications is a major concern when operating a WiFi network. Public networks with high user density, such as those [&hellip;]","og_url":"https:\/\/www.galgus.ai\/en\/blog\/concerned-about-wifi-networks-security\/","og_site_name":"Galgus","article_publisher":"https:\/\/www.facebook.com\/GalgusCHT","article_published_time":"2019-02-12T13:02:45+00:00","og_image":[{"width":640,"height":452,"url":"https:\/\/www.galgus.ai\/wp-content\/uploads\/2019\/02\/IMAGEN-PARA-BLOG-GALGUS.png","type":"image\/png"}],"author":"galgus","twitter_card":"summary_large_image","twitter_creator":"@galgus_","twitter_site":"@galgus_","twitter_misc":{"Written by":"galgus","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.galgus.ai\/en\/blog\/concerned-about-wifi-networks-security\/#article","isPartOf":{"@id":"https:\/\/www.galgus.ai\/en\/blog\/concerned-about-wifi-networks-security\/"},"author":{"name":"galgus","@id":"https:\/\/www.galgus.ai\/en\/#\/schema\/person\/e79bfa60d8df63cbcc4564a89c6e3479"},"headline":"Concerned about WiFi networks cybersecurity?","datePublished":"2019-02-12T13:02:45+00:00","mainEntityOfPage":{"@id":"https:\/\/www.galgus.ai\/en\/blog\/concerned-about-wifi-networks-security\/"},"wordCount":272,"commentCount":0,"publisher":{"@id":"https:\/\/www.galgus.ai\/en\/#organization"},"image":{"@id":"https:\/\/www.galgus.ai\/en\/blog\/concerned-about-wifi-networks-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.galgus.ai\/wp-content\/uploads\/2019\/02\/IMAGEN-PARA-BLOG-GALGUS.png","inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.galgus.ai\/en\/blog\/concerned-about-wifi-networks-security\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.galgus.ai\/en\/blog\/concerned-about-wifi-networks-security\/","url":"https:\/\/www.galgus.ai\/en\/blog\/concerned-about-wifi-networks-security\/","name":"Concerned about WiFi networks cybersecurity? | Galgus","isPartOf":{"@id":"https:\/\/www.galgus.ai\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.galgus.ai\/en\/blog\/concerned-about-wifi-networks-security\/#primaryimage"},"image":{"@id":"https:\/\/www.galgus.ai\/en\/blog\/concerned-about-wifi-networks-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.galgus.ai\/wp-content\/uploads\/2019\/02\/IMAGEN-PARA-BLOG-GALGUS.png","datePublished":"2019-02-12T13:02:45+00:00","breadcrumb":{"@id":"https:\/\/www.galgus.ai\/en\/blog\/concerned-about-wifi-networks-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.galgus.ai\/en\/blog\/concerned-about-wifi-networks-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.galgus.ai\/en\/blog\/concerned-about-wifi-networks-security\/#primaryimage","url":"https:\/\/www.galgus.ai\/wp-content\/uploads\/2019\/02\/IMAGEN-PARA-BLOG-GALGUS.png","contentUrl":"https:\/\/www.galgus.ai\/wp-content\/uploads\/2019\/02\/IMAGEN-PARA-BLOG-GALGUS.png","width":640,"height":452},{"@type":"BreadcrumbList","@id":"https:\/\/www.galgus.ai\/en\/blog\/concerned-about-wifi-networks-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.galgus.ai\/en\/"},{"@type":"ListItem","position":2,"name":"Concerned about WiFi networks cybersecurity?"}]},{"@type":"WebSite","@id":"https:\/\/www.galgus.ai\/en\/#website","url":"https:\/\/www.galgus.ai\/en\/","name":"Galgus","description":"Expertos en WiFi","publisher":{"@id":"https:\/\/www.galgus.ai\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.galgus.ai\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.galgus.ai\/en\/#organization","name":"Galgus","url":"https:\/\/www.galgus.ai\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.galgus.ai\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.galgus.net\/wp-content\/uploads\/2020\/12\/galgus_logo.png","contentUrl":"https:\/\/www.galgus.net\/wp-content\/uploads\/2020\/12\/galgus_logo.png","width":425,"height":192,"caption":"Galgus"},"image":{"@id":"https:\/\/www.galgus.ai\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/GalgusCHT","https:\/\/x.com\/galgus_","https:\/\/www.instagram.com\/galgus\/","https:\/\/www.linkedin.com\/company\/11042569\/","https:\/\/www.youtube.com\/channel\/UC-YtD_RCpb4X8hvalKLv02g"]},{"@type":"Person","@id":"https:\/\/www.galgus.ai\/en\/#\/schema\/person\/e79bfa60d8df63cbcc4564a89c6e3479","name":"galgus","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.galgus.ai\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/512273c964661efe4018078bedf71de7a38c3f34e4344954d21c4ed7a4cfcba6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/512273c964661efe4018078bedf71de7a38c3f34e4344954d21c4ed7a4cfcba6?s=96&d=mm&r=g","caption":"galgus"}}]}},"_links":{"self":[{"href":"https:\/\/www.galgus.ai\/en\/wp-json\/wp\/v2\/posts\/5979","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.galgus.ai\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.galgus.ai\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.galgus.ai\/en\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.galgus.ai\/en\/wp-json\/wp\/v2\/comments?post=5979"}],"version-history":[{"count":0,"href":"https:\/\/www.galgus.ai\/en\/wp-json\/wp\/v2\/posts\/5979\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.galgus.ai\/en\/wp-json\/wp\/v2\/media\/5613"}],"wp:attachment":[{"href":"https:\/\/www.galgus.ai\/en\/wp-json\/wp\/v2\/media?parent=5979"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.galgus.ai\/en\/wp-json\/wp\/v2\/categories?post=5979"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.galgus.ai\/en\/wp-json\/wp\/v2\/tags?post=5979"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}