Risky Wi-Fi Hotspots
Threat Description and actions taken by Wandera
Threat Description and actions taken by Wandera
A Man-in-the-Middle attack is a sophisticated network-based exploit that is specifically designed to intercept and/or manipulate otherwise encrypted data without the end user’s knowledge. It may be carried out on WiFi or Cellular networks.
Wandera offers patent-pending MitM detection technology that reliably detects if SSL/TLS network connections are being compromised while using any WiFi or Cellular network. Such compromises are evidence of a MitM attack, which may or may not be of malicious intent.
MitM attacks are typically carried out in the following ways:
It is important to note that there are some cases in which a MitM will be detected but is not representative of malicious intent. However, even in these cases, the SSL/TLS connection chain-of-trust is still being broken, enabling encrypted data with the expectation of secrecy to be potentially accessed by an unauthorized 3rd party.Specific examples of this situation include:
Wandera flags MitM threats based upon whether or not the device inherently trusts the invalid SSL connection. Specifically, if the device trusts a certificate that is known to be forged, Wandera raises a maximum security event as this is indicative of a significant device compromise. However, if the device doesn’t automatically trust a forged certificate, a lower-rated threat is raised since acceptance of the connection generally requires manual user approval to proceed.
Wandera Secure was designed for mobile and works seamlessly on iPhone, Android and Windows phones.
After installing the solution the app will protect and inform you directly if there are severe threats on your mobile device.
Additionally, you will receive an e-mail at the end of each month, with an overview of detected and remediated security threats during the month.
Wandera Secure gives you peace of mind!
Billions of daily mobile data inputs are collected through the multi-level architecture and analyzed in real time by a mobile intelligence engine powered by Wandera.
Beyond inspecting the content, it studies the apps making each request, and maintains a reputation for each app.
When you analyze more data, you intelligently prevent more threats.
Unique Domains Visited
High severity threats detected
Data seen (in GB)
Daily inputs from mobile devices
It’s in your (colleague’s) best interest to be able to use the smartphone / tablet to do business without worrying about anything else.
Flexinets now offers an Enterprise Mobile security solution for small and medium businesses as a managed service to make sure that you at least don’t have to worry about the security of your mobile devices.
Jailbreaks, Semi Jailbreaks, Outdated OS, Malicious Profiles, Vulnerabilities.
Personally Identifiable Information (PII) leaks from approved apps, Ad servers & APIs, Sideloading, Permissions.
Malicious sites & apps, Browser exploits, Phishing & Spam.
Man in the Middle Attacks, Rogue hotspots, Certificate spoof, WiFi phishing, Public cloud apps.
Managed for your convenience
When e.g. an email is sent to your account with a link to an invoice. As soon as you open the link, you will be sent to a website that can infect your smartphone with software e.g. “ransomware”. This software will lock your screen from further usage. The only way to access your phone again is paying the requested ransom to obtain the necessary code to unlock it (or restore your latest phone backup).
Our Mobile Security Solution protects you against exploits/malicious apps. As soon as you click the link, the access to this site is blocked so ransomware can not be downloaded on your phone. This happens because the link is analysed by our malware detector (which analyses 2 billion web request every day) which then defines the website behind the link as insecure and access is denied.
MAN IN THE MIDDLE ATTACK
Even if your email is encrypted, hackers can still compromise your privacy if you connect to a rogue hotspot (a hotspot masked as a free wifi hotspot for example at your local coffee shop.) that a hacker has set up. You think you are securely connected to your local café. In reality, it can be a mobile hotspot set up by hackers to exploit weaknesses in apps and possibly gain access to secure communication to read all your unencrypted communications as soon as you’re logged in. The hacker can with this information pretend he is you. And for example send an email in your name to your colleague eg. with a message that you for example need to transfer money or have to pay an attached invoice. The more information a hacker gets about you, the easier they can impersonate you and take advantage of the situation.
Our Mobile Security Solution can help identifying potentially malicious hotspots and protect you from situations like this. The service seamlessly scans and determine if a wifi hotspot is not secure and can block or warn about it to prevent your email from being misused.
We are buying more and more products and services online via our smartphones / tablets. When you do this, your credit card information is sent over the internet and in some cases this is done unencrypted (last year, this happened when flights were booked through the Easyjet app and a number of other airline apps). If this happens, the credit card information can be read and can be misused by hackers.
Our Mobile Security Solution protects you against these insecure apps through a combination of app reputation and scanning for unencrypted personal data like credit card numbers, passwords etc. If personal data is sent unencrypted or there are other security issues, you will be notified immediately via an in-app notification. You can then delete the app to be sure that your personal data is not misused.
Flexible Networks Nordic AB
Mäster Samuelsgatan 60, SE-111 21 Stockholm,
P.O. Box 3029, SE-720 03 Västerås, Sweden
Tel: +46 (0)8 5465 8420
Flexible Networks Nordic OY
Tekniikantie 14, 02150 Espoo,
Tel: +358 (0) 94 245 0327
Savsvinget 7, 2970 Hørsholm
Tel: +45 7014 539 9
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.