Connect with us

Published

on

Over the years, travelers have repeatedly been warned to avoid public Wi-Fi in places like airports and coffee shops. Airport Wi-Fi, in particular, is known to be a hacker honeypot, due to what is typically relatively lax security. But even though many people know they should stay away from free Wi-Fi, it proves as irresistible to travelers as it is to hackers, who are now updating an old cybercrime tactic to take advantage.

An arrest in Australia over the summer set off alarm bells in the United States that cybercriminals are finding new ways to profit from what are called “evil twin” attacks. Also classified within a type of cybercrime called “Man in the Middle” attacks, evil twinning occurs when a hacker or hacking group sets up a fake Wi-Fi network, most often in public settings where many users can be expected to connect.

In this instance, an Australian man was charged with conducting a Wi-Fi attack on domestic flights and airports in Perth, Melbourne, and Adelaide. He allegedly set up a fake Wi-Fi network to steal email or social media credentials.

“As the general population becomes more accustomed to free Wi-Fi everywhere, you can expect evil twinning attacks to become more common,” said Matt Radolec, vice president of incident response and cloud operations at data security firm Varonis, adding that no one reads the terms and conditions or checks the URLs on free Wi-Fi.

“It’s almost a game to see how fast you can click “accept” and then ‘sign in’ or ‘connect.’ This is the ploy, especially when visiting a new location; a user might not even know what a legitimate site should look like when presented with a fake site,” Radolec said.

Today’s ‘evil twins’ can more easily hide

One of the dangers of today’s twinning attacks is that the technology is much easier to disguise. An evil twin can be a tiny device and can be tucked behind a display in a coffee shop, and the small device can have a significant impact.

“A device like this can serve up a compelling copy of a valid login page, which could invite unwary device users to enter their username and password, which would then be collected for future exploitation,” said Cincinnati-based IT consultant Brian Alcorn. 

The site doesn’t even have to actually log you in. “Once you’ve entered your information, the deed is done,” Alcorn said, adding that a harried, weary traveler probably would just think the airport Wi-Fi is having issues and not give it another thought.  

People who are not careful with passwords, such as use of pet’s names or favorite sports teams as their password for everything, are even more vulnerable to an evil twin attack. Alcorn says for individuals who reuse username and password combinations online, once the credentials are obtained they can be fed into AI, where its power can quickly give cybercriminals the key.

“You are susceptible to exploitation by someone with less than $500 in equipment and less skill than you might imagine,” Alcorn said. “The attacker just has to be motivated with basic IT skills.”

How to avoid becoming a victim of this cybercrime

When in public places, experts say it’s best to use alternatives to public WiFi networks.

“My favorite way to avoid evil twin attacks is to use your phone’s mobile hotspot if possible,” said Brian Callahan, Director of the Rensselaer Cybersecurity Collaboratory at Rensselaer Polytechnic Institute.

Users would be able to spot an attack if through a phone relying on its mobile data and sharing it via a mobile hotspot.

“You will know the name of that network since you made it, and you can put a strong password that only you know on it to connect,” Callahan said.

If a hotspot isn’t an option, a VPN can also provide some protection, Callahan said, as traffic should be encrypted to and from the VPN.

“So even if someone else can see the data, they can’t do anything about it,” he said.

Airport, airline internet security issues

At many airports, the responsibility for WiFi is outsourced and the airport itself has little if any involvement in safeguarding it. At Dallas Fort Worth International Airport, for example, Boingo is the Wi-Fi provider.

“The airport’s IT team does not have access to their systems, nor can we see usage and dashboards,” For said an airport spokesman. “The network is isolated from DAL’s systems as it is a separate standalone system with no direct connection to any of the City of Dallas’ networks or systems internally.” 

A spokeswoman for Boingo, which provides service to approximately 60 airports in North America, said it can identify rogue Wi-Fi access points through its network management. “The best way passengers can be protected is by using Passpoint, which uses encryption to automatically connect users to authenticated Wi-Fi for a safe online experience,” she said, adding that Boingo has offered Passpoint since 2012 to enhance Wi-Fi security and eliminate the risk of connecting to malicious hotspots.

Alcorn says evil twin attacks are “definitely” occurring with regularity in the United States, it’s just rare for someone to get caught because they are such stealth attacks.  And sometimes hackers use these attacks as a learning model. “Many evil twin attacks may be experimental by individuals with novice-to-intermediate skills just to see if they can do it and get away with it, even if they don’t use the collected information right away,” he said.

The surprise in Australia wasn’t the evil twinning attack itself, but the arrest.

“This incident isn’t unique, but it is unusual that the suspect was arrested,” said Aaron Walton, threat analyst at Expel, a managed services security company. “Generally, airlines are not equipped and prepared to handle or mediate hacking accusations. The typical lack of arrests and punitive action should motivate travelers to exercise caution with their own data, knowing what a tempting and usually unguarded -target it is — especially at the airport.”

In the Australian case, according to Australian Federal Police, dozens of people had their credentials stolen.

According to a press release from the AFP, “When people tried to connect their devices to the free WiFi networks, they were taken to a fake webpage requiring them to sign in using their email or social media logins. Those details were then allegedly saved to the man’s devices.”  

Once those credentials were harvested, they could be used to extract more information from the victims, including bank account information.

For hackers to be successful, they don’t have to dupe everyone. If they can persuade only a handful of people – statistically easy to do when thousands of harried and hurried people are milling around an airport – they will succeed.

“We expect WI-Fi to be everywhere. When you go to a hotel, or an airport, or a coffee shop, or even just out and about, we expect there to be Wi-Fi and often freely available WI-FI,” Callahan said. “After all, what’s yet another network name in the long list when you’re at an airport? An attacker doesn’t need everyone to connect to their evil twin, only some people who go on to put credentials into websites that can be stolen.”

The next time you’re at the airport, the only way to be 100% sure you’re safe is to bring your own Wi-Fi.

Continue Reading

Technology

Microsoft hit with Azure, 365 outage ahead of quarterly earnings report

Published

on

By

Microsoft hit with Azure, 365 outage ahead of quarterly earnings report

Microsoft CEO Satya Nadella departs following a meeting of the White House Task Force on AI Education in the East Room of the White House in Washington on Sept. 4, 2025.

Eric Lee | Bloomberg | Getty Images

Microsoft was hit with outages in its Azure cloud and 365 services on Wednesday, hours before the company’s scheduled earnings release.

Users on social media reported problems accessing their sites and services running on Microsoft’s products, and the company’s websites, including its investor relations page, were down. The problems began around 11:40 a.m. ET, according to Downdetector, which relies on user reports.

“We are working to address an issue affecting Azure Front Door that is impacting the availability of some services,” a Microsoft spokesperson said in an emailed statement. “Customers should continue to check their Service Health Alerts and the latest update on this issue can be found on the Azure status page.”

The Azure support account on X said, “We’re investigating an issue impacting several Azure services,” and that “customers may experience issues when accessing services.”

The latest update on Azure’s status page says that issues began with AFD at about noon ET, “resulting in a loss of availability of some services.” The company said it suspects an “inadvertent configuration change” was the trigger and that it’s “rolling back to our last known good state” for AFD services.

“We do not have an ETA for when the rollback will be completed, but we will update this communication within 30 minutes or when we have an update,” the company wrote.

Microsoft’s 365 status account wrote that its services are “experiencing downstream impact related to the ongoing Azure outage.”

The service disruptions come a little over a week after larger rival Amazon Web Services reported a major outage that took down numerous websites. Throughout the day on Oct. 20, AWS said it observed “increased error rates” for customers when trying to launch new instances in EC2, its popular cloud service that provides virtual server capacity.

AWS leads in cloud infrastructure with 32% of the market as of the first quarter, according to Canalys. Azure is second at 23%, followed by Google’s cloud unit at 10%. Azure and Google Cloud have been growing faster of late, driven by a boom in artificial intelligence workloads.

All three companies are set to report quarterly results this week, starting with Microsoft and Google parent Alphabet on Wednesday after the bell. Amazon reports on Thursday.

Alaska Airlines said on Wednesday afternoon that it’s currently “experiencing a disruption to key systems,” including websites, due to the outage on Azure, “where several Alaska and Hawaiian Airlines services are hosted.” Alaska closed its $1.9 billion acquisition of Hawaiian last year.

In March, Microsoft suffered an outage over a weekend that left tens of thousands of users unable to access their Outlook email accounts and other programs.

WATCH: OpenAI clears restructuring hurdle.

OpenAI clears restructuring hurdle, unlocking $40B SoftBank-led funding and setting stage for IPO

Continue Reading

Technology

Nvidia hits $5T market cap without big China sales. Jim Cramer says that could change

Published

on

By

Nvidia hits T market cap without big China sales. Jim Cramer says that could change

Continue Reading

Technology

OpenAI introduces safety models that other sites can use to classify harms

Published

on

By

OpenAI introduces safety models that other sites can use to classify harms

Sam Altman, CEO of OpenAI, attends the annual Allen and Co. Sun Valley Media and Technology Conference at the Sun Valley Resort in Sun Valley, Idaho, on July 8, 2025.

David A. Grogan | CNBC

OpenAI on Wednesday announced two reasoning models that developers can use to classify a range of online safety harms on their platforms. 

The artificial intelligence models are called gpt-oss-safeguard-120b and gpt-oss-safeguard-20b, and their names reflect their sizes. They are fine-tuned, or adapted, versions of OpenAI’s gpt-oss models, which the company announced in August. 

OpenAI is introducing them as so-called open-weight models, which means their parameters, or the elements that improve the outputs and predictions during training, are publicly available. Open-weight models can offer transparency and control, but they are different from open-source models, whose full source code becomes available for users to customize and modify.

Organizations can configure the new models to their specific policy needs, OpenAI said. And since they are reasoning models that show their work, developers will have more direct insight into how they arrive at a particular output. 

For instance, a product reviews site could develop a policy and use gpt-oss-safeguard models to screen reviews that might be fake, OpenAI said. Similarly, a video game discussion forum could classify posts that discuss cheating.

OpenAI developed the models in partnership with Robust Open Online Safety Tools, or ROOST, an organization dedicated to building safety infrastructure for AI. Discord and SafetyKit also helped test the models. They are initially available in a research preview, and OpenAI said it will seek feedback from researchers and members of the safety community.

As part of the launch, ROOST is establishing a model community for researchers and practitioners that are using AI models in an effort to protect online spaces.

The announcement could help OpenAI placate some critics who have accused the startup of commercializing and scaling too quickly at the expense of AI ethics and safety. The startup is valued at $500 billion, and its consumer chatbot, ChatGPT, has surpassed 800 million weekly active users. 

On Tuesday, OpenAI said it’s completed its recapitalization, cementing its structure as a nonprofit with a controlling stake in its for-profit business. OpenAI was founded in 2015 as a nonprofit lab, but has emerged as the most valuable U.S. tech startup in the years since releasing ChatGPT in late 2022.

“As AI becomes more powerful, safety tools and fundamental safety research must evolve just as fast — and they must be accessible to everyone,” ROOST President Camille François, said in a statement.

Eligible users can download the model weights on Hugging Face, OpenAI said.

WATCH: OpenAI finalizes recapitalization plan

OpenAI finalizes recapitalization plan

Continue Reading

Trending