| http://www.w3.org/ns/prov#value | - These attacks could be used to gather information such as login credentials - useful for attacks against individuals directly, or companies posing as legitimate users.It is clear that while wireless network popularity has grown, their accessibility requires appropriate segregation to be in place.
|