In this dwell occasion recording, Danny, Rob, and the ThreatLocker staff show how a WiFi Pineapple (and a drone) can simply infiltrate your group’s WiFi, and set up how one can stop your self from falling sufferer to one in all these assaults!
ThreatLocker® is a frontrunner in endpoint safety applied sciences, offering enterprise-level cybersecurity instruments to enhance the safety of servers and endpoints. ThreatLocker’s mixed Application Allowlisting, Ringfencing™, Storage Control, Elevation Control, and Endpoint Network Access Control (NAC) options are main the cybersecurity market towards a safer method to blocking the exploits of unknown utility vulnerabilities.
For More on ThreatLocker®:
Sign up for a demo:
– https://threatlocker.com/demo-sign-up?utm_source=youtubevideo&utm_medium=webinar&utm_campaign=2022-12-pineappledangerwebinar&utm_content=descriptionurl
Register for Zero Trust World:
– https://zerotrustworld.threatlocker.com/?utm_source=youtubevideo&utm_medium=webinar&utm_campaign=2022-12-pineappledangerwebinar&utm_content=descriptionurl
Website:
– https://threatlocker.com/?utm_source=youtubevideo&utm_medium=webinar&utm_campaign=2022-12-pineappledangerwebinar&utm_content=descriptionurl
LinkedIn:
– https://www.linkedin.com/company/threatlockerinc/
Facebook:
– https://www.facebook.com/thethreatlocker
Twitter:
– https://twitter.com/ThreatLocker
Instagram:
– https://www.instagram.com/threatlockersecurity/
©2022 ThreatLocker Inc., All Rights Reserved.
00:00 – Introduction
1:21 – What is a WiFi Pineapple?
3:46 – How a drone may help somebody hack your WiFi!
8:24 – The drone takes off!
9:25 – How a WiFi Pineapple works (Part 1)
14:45 – How to scale back the probability you’ll be attacked by a WiFi Pineapple.
18:53 – How a WiFi Pineapple works (Part 2)
24:24 – Q&A
31:16 – Closing
source