{"id":1504,"date":"2023-02-25T14:46:21","date_gmt":"2023-02-25T14:46:21","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=1504"},"modified":"2023-02-25T14:46:21","modified_gmt":"2023-02-25T14:46:21","slug":"toi-pham-mang-qua-wifi-nhung-dieu-ban-can-biet","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/vi\/cong-nghe-2\/toi-pham-mang-qua-wifi-nhung-dieu-ban-can-biet\/","title":{"rendered":"T\u1ed9i ph\u1ea1m m\u1ea1ng th\u00f4ng qua WiFi: Nh\u1eefng \u0111i\u1ec1u b\u1ea1n c\u1ea7n bi\u1ebft"},"content":{"rendered":"<p>An ninh m\u1ea1ng \u0111\u01b0\u1ee3c c\u00e1c t\u1eadp \u0111o\u00e0n v\u00e0 c\u00f4ng ty coi l\u00e0 \u01b0u ti\u00ean h\u00e0ng \u0111\u1ea7u v\u00e0 h\u1ecd \u0111ang \u0111\u1ea7u t\u01b0 \u0111\u00e1ng k\u1ec3 v\u00e0o t\u01b0\u1eddng l\u1eeda cho ph\u00e9p h\u1ec7 th\u1ed1ng c\u1ee7a h\u1ecd kh\u00f4ng th\u1ec3 truy c\u1eadp \u0111\u01b0\u1ee3c m\u1ed9t c\u00e1ch hi\u1ec7u qu\u1ea3. Tuy nhi\u00ean, nhi\u1ec1u c\u00f4ng ty trong s\u1ed1 n\u00e0y kh\u00f4ng nh\u1eadn th\u1ee9c \u0111\u01b0\u1ee3c nguy c\u01a1 b\u1ecb t\u1ed9i ph\u1ea1m m\u1ea1ng t\u1ea5n c\u00f4ng do m\u1ea1ng WIFI c\u1ee7a h\u1ecd t\u1ea1o ra.<\/p>\n\n\n\n<p>WIFI b\u1ecb l\u1ed7i, c\u00f9ng v\u1edbi vi\u1ec7c kh\u00f4ng hi\u1ec3u r\u00f5 c\u00e1c d\u1ea5u hi\u1ec7u r\u00f5 r\u00e0ng c\u1ee7a c\u00e1c m\u1ed1i \u0111e d\u1ecda m\u1ea1ng, c\u00f3 th\u1ec3 v\u00f4 t\u00ecnh cung c\u1ea5p cho t\u1ed9i ph\u1ea1m m\u1ea1ng quy\u1ec1n truy c\u1eadp v\u00e0o th\u00f4ng tin kinh doanh n\u1ed9i b\u1ed9 nh\u1ea1y c\u1ea3m. Ngo\u00e0i ra, n\u00f3 c\u0169ng c\u00f3 th\u1ec3 khi\u1ebfn nh\u00e2n vi\u00ean ph\u1ea3i \u0111\u1ed1i m\u1eb7t v\u1edbi nguy c\u01a1 th\u1ea3m kh\u1ed1c v\u1ec1 tr\u1ed9m c\u1eafp danh t\u00ednh, l\u1eeba \u0111\u1ea3o v\u00e0 c\u00e1c tr\u00f2 gian l\u1eadn m\u1ea1ng kh\u00e1c. \u0110i\u1ec1u m\u00e0 nhi\u1ec1u ng\u01b0\u1eddi kh\u00f4ng nh\u1eadn ra l\u00e0 WIFI c\u1ee7a h\u1ecd c\u00f3 th\u1ec3 l\u00e0m m\u1ea5t hi\u1ec7u l\u1ef1c c\u00e1c n\u1ed7 l\u1ef1c b\u1ea3o v\u1ec7 t\u00e0i s\u1ea3n c\u1ee7a h\u1ecd. Ch\u00fang ta ph\u1ea3i nh\u1eadn th\u1ee9c r\u1eb1ng ch\u00fang ta \u0111ang ph\u1ea3i \u0111\u1ed1i m\u1eb7t v\u1edbi cu\u1ed9c t\u1ea5n c\u00f4ng c\u1ee7a \u201c<a href=\"https:\/\/www.techtarget.com\/iotagenda\/definition\/man-in-the-middle-attack-MitM\" target=\"_blank\" rel=\"noreferrer noopener\">\u201cng\u01b0\u1eddi \u1edf gi\u1eefa\u201d (MITM).<\/a> Tuy nhi\u00ean, v\u1edbi ki\u1ebfn th\u1ee9c t\u1ed5 ch\u1ee9c ph\u00f9 h\u1ee3p v\u00e0 c\u00f4ng ngh\u1ec7 \u0111\u01a1n gi\u1ea3n, ch\u00fang ta c\u00f3 th\u1ec3 d\u1ec5 d\u00e0ng ng\u0103n ng\u1eeba t\u00ecnh tr\u1ea1ng n\u00e0y.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"cyber-attack-mode-through-wifi\">Ch\u1ebf \u0111\u1ed9 t\u1ea5n c\u00f4ng m\u1ea1ng th\u00f4ng qua WIFI<\/h2>\n\n\n<p>T\u1ed9i ph\u1ea1m m\u1ea1ng kh\u00f4ng ng\u1eebng ngh\u1ec9 v\u00e0 t\u1ed9i ph\u1ea1m m\u1ea1ng li\u00ean t\u1ee5c ph\u00e1t tri\u1ec3n, nh\u1eafm m\u1ee5c ti\u00eau v\u00e0o c\u00e1c t\u1ed5 ch\u1ee9c v\u00e0 t\u1eadp trung s\u1ef1 ch\u00fa \u00fd v\u00e0o ng\u01b0\u1eddi d\u00f9ng c\u00e1 nh\u00e2n. Trong th\u1ebf gi\u1edbi k\u1ef9 thu\u1eadt s\u1ed1, n\u01a1i k\u1ebft n\u1ed1i v\u00e0 truy c\u1eadp kh\u00f4ng d\u00e2y l\u00e0 \u0111i\u1ec1u c\u1ea7n thi\u1ebft, nh\u1eefng k\u1ebb c\u01a1 h\u1ed9i tr\u1ef1c tuy\u1ebfn t\u00ecm c\u00e1ch l\u1ee3i d\u1ee5ng.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"rogue-access-points\">\u0110i\u1ec3m truy c\u1eadp gi\u1ea3 m\u1ea1o<\/h3>\n\n\n<p>T\u1ed9i ph\u1ea1m m\u1ea1ng ch\u1eb7n d\u1eef li\u1ec7u ch\u1ea1y qua c\u00e1c \u0111i\u1ec3m truy c\u1eadp kh\u00f4ng d\u00e2y v\u00e0 s\u1eed d\u1ee5ng d\u1eef li\u1ec7u \u0111\u00f3 \u0111\u1ec3 tr\u1ee5c l\u1ee3i. Quy tr\u00ecnh n\u00e0y s\u1eed d\u1ee5ng c\u00f4ng ngh\u1ec7 gi\u00e1 r\u1ebb cho ph\u00e9p t\u1ed9i ph\u1ea1m m\u1ea1ng thi\u1ebft l\u1eadp c\u00e1c \u0111i\u1ec3m truy c\u1eadp &quot;gi\u1ea3&quot; ho\u1eb7c m\u1ea1ng l\u1eeba \u0111\u1ea3o ng\u1ee5y trang th\u00e0nh c\u00e1c \u0111i\u1ec3m truy c\u1eadp WIFI h\u1ee3p ph\u00e1p v\u1edbi ti\u00eau \u0111\u1ec1 quen thu\u1ed9c. Sau \u0111\u00f3, ch\u00fang quan s\u00e1t c\u00e1c l\u1ea7n nh\u1ea5n ph\u00edm v\u00e0 l\u1ea5y d\u1eef li\u1ec7u c\u00e1 nh\u00e2n b\u1ea5t h\u1ee3p ph\u00e1p, v\u00e0 trong h\u1ea7u h\u1ebft c\u00e1c tr\u01b0\u1eddng h\u1ee3p l\u00e0 th\u00f4ng tin b\u00ed m\u1eadt, t\u1eeb b\u1ea5t k\u1ef3 ai tham gia m\u1ea1ng. V\u00ec c\u00e1c \u0111i\u1ec3m truy c\u1eadp l\u1eeba \u0111\u1ea3o n\u00e0y kh\u00f4ng \u0111\u01b0\u1ee3c m\u00e3 h\u00f3a, n\u00ean m\u1ecdi ho\u1ea1t \u0111\u1ed9ng ch\u1ea1y qua ch\u00fang \u0111\u1ec1u ho\u00e0n to\u00e0n c\u00f4ng khai v\u00e0 c\u00f3 th\u1ec3 nh\u00ecn th\u1ea5y \u0111\u01b0\u1ee3c \u0111\u1ed1i v\u1edbi b\u1ea5t k\u1ef3 ai s\u1eb5n s\u00e0ng t\u00ecm ki\u1ebfm.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"interception-of-data\">Ch\u1eb7n d\u1eef li\u1ec7u<\/h3>\n\n\n<p>Vi\u1ec7c ch\u1eb7n d\u1eef li\u1ec7u nh\u01b0 m\u1eadt kh\u1ea9u v\u00e0 t\u00ean ng\u01b0\u1eddi d\u00f9ng c\u00f3 th\u1ec3 cho ph\u00e9p truy c\u1eadp tr\u00e1i ph\u00e9p v\u00e0o th\u00f4ng tin nh\u1ea1y c\u1ea3m, bao g\u1ed3m ng\u00e2n h\u00e0ng tr\u1ef1c tuy\u1ebfn, th\u00f4ng tin th\u1ebb t\u00edn d\u1ee5ng v\u00e0 gi\u1ea5y ph\u00e9p c\u1ee7a c\u00f4ng ty. T\u1ed9i ph\u1ea1m m\u1ea1ng c\u00f3 th\u1ec3 kh\u00f4ng s\u1eed d\u1ee5ng th\u00f4ng tin ngay l\u1eadp t\u1ee9c, nh\u01b0ng ch\u00fang c\u00f3 th\u1ec3 x\u00e2m ph\u1ea1m c\u00e1c t\u00e0i kho\u1ea3n n\u00e0y v\u00e0 th\u00f4ng tin c\u00f3 trong \u0111\u00f3 b\u1ea5t k\u1ef3 l\u00fac n\u00e0o.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"lateral-movement\">Chuy\u1ec3n \u0111\u1ed9ng ngang<\/h3>\n\n\n<p>M\u1ed1i quan t\u00e2m c\u1ee7a h\u1ea7u h\u1ebft ng\u01b0\u1eddi d\u00f9ng b\u1eaft ngu\u1ed3n t\u1eeb t\u00e0i li\u1ec7u ri\u00eang t\u01b0 v\u00e0 \u0111\u00f4i khi l\u00e0 t\u00e0i li\u1ec7u b\u00ed m\u1eadt m\u00e0 h\u1ecd l\u01b0u tr\u00ean thi\u1ebft b\u1ecb c\u1ee7a m\u00ecnh, nh\u01b0ng t\u1ed9i ph\u1ea1m m\u1ea1ng hi\u1ebfm khi quan t\u00e2m \u0111\u1ebfn lo\u1ea1i t\u00e0i li\u1ec7u n\u00e0y. Ch\u00fang quan t\u00e2m nhi\u1ec1u h\u01a1n \u0111\u1ebfn vi\u1ec7c di chuy\u1ec3n ngang t\u00e0i kho\u1ea3n email c\u1ee7a n\u1ea1n nh\u00e2n kh\u00f4ng h\u1ec1 hay bi\u1ebft. V\u00ed d\u1ee5, n\u1ebfu tin t\u1eb7c c\u00f3 quy\u1ec1n truy c\u1eadp v\u00e0o t\u00e0i kho\u1ea3n email c\u1ee7a b\u1ea1n, ch\u00fang c\u00f3 th\u1ec3 b\u1eadt th\u00f4ng b\u00e1o m\u1eadt kh\u1ea9u t\u1eeb c\u00e1c trang web nh\u01b0 PayPal v\u00e0 theo d\u00f5i c\u00e1c l\u1ea7n nh\u1ea5n ph\u00edm khi b\u1ea1n b\u1eadt th\u00f4ng tin \u0111\u0103ng nh\u1eadp m\u1edbi.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"public-vs-corporate-wifi\">WIFI c\u00f4ng c\u1ed9ng so v\u1edbi WIFI doanh nghi\u1ec7p<\/h2>\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Public-vs.-corporate-WIFI-2-1.jpg\" alt=\"Public vs. corporate WIFI 2 1\" class=\"wp-image-1510\"\/><\/figure>\n\n\n\n<div style=\"height:35px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>C\u00e1c v\u1ee5 vi\u1ec7c do th\u00e1m WIFI tr\u00ean to\u00e0n th\u1ebf gi\u1edbi \u0111ang gia t\u0103ng. T\u1ed9i ph\u1ea1m m\u1ea1ng \u0111\u00e3 b\u1eaft \u0111\u01b0\u1ee3c nhi\u1ec1u n\u1ea1n nh\u00e2n n\u1ed5i ti\u1ebfng, x\u00e2m nh\u1eadp v\u00e0o m\u1ea1ng kh\u00f4ng d\u00e2y c\u1ee7a c\u00e1c th\u01b0\u01a1ng hi\u1ec7u gia d\u1ee5ng nh\u01b0 Starbucks, American Airlines v\u00e0 TalkTalk. \u0110\u1ed9ng th\u00e1i n\u00e0y th\u1eadm ch\u00ed c\u00f2n <a href=\"https:\/\/routersecurity.org\/RouterNews.php\" target=\"_blank\" rel=\"noreferrer noopener\">\u0111\u00e3 th\u00fac \u0111\u1ea9y FBI c\u1ea3nh b\u00e1o ng\u01b0\u1eddi d\u00f9ng<\/a> \u0111\u1ec3 truy c\u1eadp v\u00e0o m\u00f4i tr\u01b0\u1eddng c\u1ee7a h\u1ecd tr\u01b0\u1edbc khi tham gia v\u00e0o m\u1ea1ng l\u01b0\u1edbi.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"false-sense-of-security\">C\u1ea3m gi\u00e1c an to\u00e0n gi\u1ea3 t\u1ea1o<\/h3>\n\n\n<p>\u0110i\u1ec1u n\u00e0y \u0111\u00e3 l\u00e0m t\u0103ng th\u00eam quan ni\u1ec7m sai l\u1ea7m r\u1eb1ng vi\u1ec7c nghe l\u00e9n ch\u1ec9 gi\u1edbi h\u1ea1n \u1edf WIFI c\u00f4ng c\u1ed9ng, l\u00e0m t\u0103ng th\u00eam c\u1ea3m gi\u00e1c an to\u00e0n sai l\u1ea7m r\u1eb1ng m\u1ea1ng l\u01b0\u1edbi v\u0103n ph\u00f2ng kh\u00f4ng ch\u1ed1ng l\u1ea1i \u0111\u01b0\u1ee3c c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng, v\u00e0 \u0111i\u1ec1u n\u00e0y l\u00e0 kh\u00f4ng \u0111\u00fang. M\u1ea1ng WIFI c\u00f3 kh\u1ea3 n\u0103ng b\u1ecb x\u00e2m ph\u1ea1m trong m\u00f4i tr\u01b0\u1eddng v\u0103n ph\u00f2ng c\u0169ng nh\u01b0 trong trung t\u00e2m mua s\u1eafm, s\u1ea3nh kh\u00e1ch s\u1ea1n ho\u1eb7c th\u1eadm ch\u00ed l\u00e0 s\u00e2n bay.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"cybercriminal-tactics\">Chi\u1ebfn thu\u1eadt c\u1ee7a t\u1ed9i ph\u1ea1m m\u1ea1ng<\/h3>\n\n\n<p>M\u1ed9t t\u00ean t\u1ed9i ph\u1ea1m m\u1ea1ng c\u00f3 c\u00f4ng ngh\u1ec7 ph\u00f9 h\u1ee3p c\u00f3 th\u1ec3 ng\u1ed3i \u1edf ph\u00eda b\u00ean kia b\u1ee9c t\u01b0\u1eddng, trong b\u00e3i \u0111\u1eadu xe b\u00ean ngo\u00e0i v\u0103n ph\u00f2ng ho\u1eb7c th\u1eadm ch\u00ed trong t\u00f2a nh\u00e0 b\u00ean c\u1ea1nh. Ch\u00fang ch\u1eafc ch\u1eafn kh\u00f4ng ph\u00e2n bi\u1ec7t gi\u1eefa m\u1ea1ng WIFI c\u00f4ng c\u1ed9ng hay m\u1ea1ng WIFI c\u1ee7a c\u00f4ng ty. M\u1ee5c ti\u00eau c\u1ee7a ch\u00fang ch\u1ec9 \u0111\u01a1n gi\u1ea3n l\u00e0 d\u1ee5 nh\u1eefng ng\u01b0\u1eddi d\u00f9ng kh\u00f4ng nghi ng\u1edd v\u00e0o m\u1ea1ng c\u1ee7a ch\u00fang v\u00e0 c\u00e1c \u0111i\u1ec3m truy c\u1eadp tr\u00e1i ph\u00e9p r\u1ed3i ph\u00e1t \u0111\u1ed9ng c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng m\u1ea1ng t\u1eeb \u0111\u00f3.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"how-can-we-protect-ourselves\">Ch\u00fang ta c\u00f3 th\u1ec3 t\u1ef1 b\u1ea3o v\u1ec7 m\u00ecnh b\u1eb1ng c\u00e1ch n\u00e0o?<\/h2>\n\n\n<p>M\u1eb7c d\u00f9 c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng m\u1ea1ng WIFI ng\u00e0y c\u00e0ng gia t\u0103ng, ch\u1ec9 m\u1ed9t s\u1ed1 \u00edt c\u00f4ng ty tri\u1ec3n khai \u0111\u00e0o t\u1ea1o v\u00e0 quy tr\u00ecnh ph\u00f9 h\u1ee3p \u0111\u1ec3 gi\u1ea3i quy\u1ebft m\u1ed1i \u0111e d\u1ecda t\u1eeb vi\u1ec7c nghe l\u00e9n WIFI<\/p>\n\n\n\n<p>drop. Nhi\u1ec1u ng\u01b0\u1eddi th\u1eadm ch\u00ed c\u00f2n tin r\u1eb1ng m\u00e3 h\u00f3a m\u1eadt kh\u1ea9u m\u1ed9t m\u00ecnh cung c\u1ea5p kh\u1ea3 n\u0103ng b\u1ea3o v\u1ec7 \u0111\u1ee7, nh\u01b0ng th\u1eadt kh\u00f4ng may, \u0111i\u1ec1u n\u00e0y kh\u00f4ng \u0111\u00fang. M\u00e3 h\u00f3a ch\u1ec9 \u00e1p d\u1ee5ng khi ng\u01b0\u1eddi d\u00f9ng c\u00f3 \u00fd th\u1ee9c ch\u1ecdn m\u1ed9t m\u1ea1ng h\u1ee3p ph\u00e1p. N\u1ebfu b\u1ea1n ch\u1ecdn m\u1ed9t \u0111i\u1ec3m truy c\u1eadp gi\u1ea3 m\u1ea1o, th\u00ec ngay t\u1eeb \u0111\u1ea7u b\u1ea1n kh\u00f4ng c\u1ea7n kh\u00f3a kh\u00f4ng d\u00e2y b\u1ea3o v\u1ec7 m\u1ea1ng c\u1ee7a m\u00ecnh.<\/p>\n\n\n\n<p>C\u00e1c t\u1ed5 ch\u1ee9c ch\u1ecbu tr\u00e1ch nhi\u1ec7m ph\u00e1p l\u00fd v\u1ec1 l\u01b0u l\u01b0\u1ee3ng v\u00e0 th\u00f4ng tin \u0111i qua m\u1ea1ng c\u1ee7a h\u1ecd. Nh\u00e2n vi\u00ean c\u00f3 ngh\u0129a v\u1ee5 ch\u0103m s\u00f3c nh\u00e2n vi\u00ean c\u1ee7a m\u00ecnh v\u00e0 ph\u1ea3i l\u00e0m m\u1ecdi th\u1ee9 trong kh\u1ea3 n\u0103ng c\u1ee7a m\u00ecnh \u0111\u1ec3 \u0111\u1ea3m b\u1ea3o m\u1ea1ng c\u1ee7a h\u1ecd an to\u00e0n. Tuy nhi\u00ean, v\u1edbi nh\u1eefng tr\u1edf ng\u1ea1i nh\u01b0 v\u1eady, l\u00e0m th\u1ebf n\u00e0o h\u1ecd c\u00f3 th\u1ec3 gi\u1ea3m thi\u1ec3u nguy c\u01a1 b\u1ecb t\u1ea5n c\u00f4ng MITM? C\u1ea7n c\u00f3 m\u1ed9t k\u1ef9 thu\u1eadt nhi\u1ec1u l\u1edbp k\u1ebft h\u1ee3p c\u00f4ng ngh\u1ec7 v\u00e0 gi\u00e1o d\u1ee5c.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"points-to-consider\">Nh\u1eefng \u0111i\u1ec3m c\u1ea7n l\u01b0u \u00fd<\/h3>\n\n\n<p>C\u1ea7n ch\u00fa tr\u1ecdng h\u01a1n v\u00e0o vi\u1ec7c \u0111\u1ea3m b\u1ea3o ng\u01b0\u1eddi d\u00f9ng hi\u1ec3u \u0111\u01b0\u1ee3c c\u00e1c m\u1ed1i nguy hi\u1ec3m v\u00e0 c\u00f3 th\u1ec3 nh\u1eadn ra b\u1ea5t k\u1ef3 h\u00e0nh vi b\u1ea5t th\u01b0\u1eddng n\u00e0o. Trong khi t\u1ed9i ph\u1ea1m m\u1ea1ng ng\u00e0y c\u00e0ng tr\u1edf n\u00ean tinh vi h\u01a1n, ph\u01b0\u01a1ng ph\u00e1p c\u1ee7a ch\u00fang th\u01b0\u1eddng tu\u00e2n theo c\u00e1c m\u00f4 h\u00ecnh quen thu\u1ed9c m\u00e0 n\u1ebfu m\u1ecdi ng\u01b0\u1eddi c\u1ea3nh gi\u00e1c, c\u00f3 th\u1ec3 s\u1ebd b\u00e1o \u0111\u1ed9ng. Sau \u0111\u00e2y l\u00e0 m\u1ed9t s\u1ed1 \u0111i\u1ec3m c\u1ea7n c\u00e2n nh\u1eafc:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Bi\u1ebft WIFI c\u1ee7a c\u00f4ng ty b\u1ea1n<\/strong>: Vi\u1ec7c tham gia m\u1ed9t \u0111i\u1ec3m truy c\u1eadp l\u1ea1 th\u01b0\u1eddng \u0111\u00f2i h\u1ecfi h\u00e0nh vi kh\u00f4ng b\u00ecnh th\u01b0\u1eddng. T\u1ed9i ph\u1ea1m m\u1ea1ng th\u01b0\u1eddng s\u1ebd chuy\u1ec3n h\u01b0\u1edbng b\u1ea1n \u0111\u1ebfn m\u1ed9t trang web \u0111\u1ed9c h\u1ea1i v\u00e0 kh\u00f4ng an to\u00e0n b\u1eaft ch\u01b0\u1edbc trang \u0111\u0103ng nh\u1eadp h\u1ee3p l\u1ec7. T\u1ea5t c\u1ea3 c\u00e1c trang n\u00e0y \u0111\u1ec1u kh\u00f4ng \u0111\u01b0\u1ee3c m\u00e3 h\u00f3a, v\u00ec v\u1eady n\u1ebfu b\u1ea1n \u0111\u0103ng nh\u1eadp, t\u1ea5t c\u1ea3 c\u00e1c giao d\u1ecbch v\u00e0 d\u1eef li\u1ec7u c\u1ee7a b\u1ea1n s\u1ebd b\u1ecb l\u1ed9. V\u00ec v\u1eady, h\u00e3y l\u00e0m quen v\u1edbi c\u00e1c SOP WIFI c\u1ee7a c\u00f4ng ty b\u1ea1n; bi\u1ebft nh\u1eefng g\u00ec \u0111ang di\u1ec5n ra v\u00e0 d\u1eebng ngay l\u1eadp t\u1ee9c n\u1ebfu c\u00f3 \u0111i\u1ec1u g\u00ec \u0111\u00f3 c\u00f3 v\u1ebb l\u1ea1. N\u1ebfu b\u1ea1n \u0111ang \u0111\u01b0\u1ee3c chuy\u1ec3n h\u01b0\u1edbng \u0111\u1ebfn m\u1ed9t c\u1ed5ng th\u00f4ng tin, \u0111\u1eb7c bi\u1ec7t l\u00e0 trong m\u00f4i tr\u01b0\u1eddng l\u00e0m vi\u1ec7c, th\u00ec \u0111\u00f3 th\u01b0\u1eddng l\u00e0 m\u1ed9t d\u1ea5u hi\u1ec7u c\u1ea3nh b\u00e1o.<\/li>\n\n\n\n<li><strong>T\u00ecm ki\u1ebfm \u1ed5 kh\u00f3a<\/strong>: N\u1ebfu b\u1ea1n l\u00e0m vi\u1ec7c t\u1eeb xa v\u00e0 k\u1ebft n\u1ed1i WIFI c\u00f4ng c\u1ed9ng, vi\u1ec7c \u0111\u01b0\u1ee3c chuy\u1ec3n h\u01b0\u1edbng \u0111\u1ebfn m\u1ed9t c\u1ed5ng th\u00f4ng tin l\u00e0 \u0111i\u1ec1u b\u00ecnh th\u01b0\u1eddng v\u00e0 h\u1ea7u h\u1ebft \u0111\u1ec1u kh\u00f4ng ph\u1ea3i l\u00e0 x\u1ea5u. B\u1ea1n c\u00f3 th\u1ec3 t\u00ecm bi\u1ec3u t\u01b0\u1ee3ng \u1ed5 kh\u00f3a tr\u00ean thanh \u0111\u1ecba ch\u1ec9 v\u00ec \u0111\u00e2y th\u01b0\u1eddng l\u00e0 d\u1ea5u hi\u1ec7u c\u1ee7a m\u1ed9t trang web h\u1ee3p ph\u00e1p.<\/li>\n\n\n\n<li><strong>Bi\u1ebft m\u1ea1ng l\u01b0\u1edbi c\u1ee7a b\u1ea1n<\/strong>: Thi\u1ebft b\u1ecb c\u1ee7a b\u1ea1n s\u1ebd li\u00ean t\u1ee5c t\u00ecm ki\u1ebfm c\u00e1c m\u1ea1ng WIFI c\u00f3 th\u1ec3 nh\u1eadn d\u1ea1ng \u0111\u01b0\u1ee3c m\u00e0 n\u00f3 \u0111\u00e3 tham gia tr\u01b0\u1edbc \u0111\u00f3. T\u1ed9i ph\u1ea1m m\u1ea1ng s\u1ebd b\u1eaft ch\u01b0\u1edbc ch\u00fang, thi\u1ebft l\u1eadp <a href=\"https:\/\/www.cisco.com\/c\/en\/us\/support\/docs\/wireless-mobility\/wlan-security\/68139-rogue-detection.html\" target=\"_blank\" rel=\"noreferrer noopener\">\u0111i\u1ec3m truy c\u1eadp b\u1ea5t h\u1ee3p ph\u00e1p<\/a> v\u1edbi c\u00f9ng ti\u00eau \u0111\u1ec1, v\u1edbi hy v\u1ecdng r\u1eb1ng b\u1ea1n s\u1ebd t\u1ef1 \u0111\u1ed9ng k\u1ebft n\u1ed1i, v\u00ec v\u1eady h\u00e3y c\u1ea3nh gi\u00e1c. N\u1ebfu b\u1ea1n \u0111ang duy\u1ec7t web t\u1ea1i McDonald&#039;s v\u00e0 \u0111\u01b0\u1ee3c y\u00eau c\u1ea7u tham gia WIFI c\u00f4ng ty c\u1ee7a h\u1ecd, th\u00ec r\u1ea5t c\u00f3 th\u1ec3 \u0111\u00f3 l\u00e0 m\u1ed9t v\u1ee5 l\u1eeba \u0111\u1ea3o.<\/li>\n<\/ol>\n\n\n<h3 class=\"wp-block-heading\" id=\"increasing-cybersecurity-in-the-wifi-network\">T\u0103ng c\u01b0\u1eddng an ninh m\u1ea1ng trong m\u1ea1ng WIFI<\/h3>\n\n\n<p>C\u00f4ng ngh\u1ec7 c\u00f3 th\u1ec3 cung c\u1ea5p kh\u1ea3 n\u0103ng b\u1ea3o v\u1ec7 ch\u1ed1ng l\u1ea1i c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng MITM. C\u00e1c c\u00f4ng c\u1ee5 ph\u00e1t hi\u1ec7n \u0111i\u1ec3m truy c\u1eadp gi\u1ea3 m\u1ea1o c\u00f3 th\u1ec3 gi\u00fap nh\u1eadn d\u1ea1ng, ph\u00e2n \u0111\u1ecbnh v\u00e0 x\u00f3a c\u00e1c \u0111i\u1ec3m truy c\u1eadp gi\u1ea3 m\u1ea1o. Ch\u1ea1y t\u1eeb c\u00e1c \u0111i\u1ec3m truy c\u1eadp h\u1ee3p ph\u00e1p, c\u00e1c lo\u1ea1i gi\u1ea3i ph\u00e1p n\u00e0y ghi l\u1ea1i v\u00e0 ki\u1ec3m tra ho\u1ea1t \u0111\u1ed9ng truy\u1ec1n qua m\u1ea1ng WIFI c\u1ee7a b\u1ea1n v\u00e0 c\u00f3 th\u1ec3 \u0111\u00e1nh d\u1ea5u b\u1ea5t k\u1ef3 h\u00e0nh vi \u0111\u00e1ng ng\u1edd n\u00e0o v\u00ec ch\u00fang cung c\u1ea5p kh\u1ea3 n\u0103ng hi\u1ec3n th\u1ecb v\u00e0 b\u1ea3o m\u1eadt.<\/p>\n\n\n\n<p>Ngo\u00e0i ra, m\u1ed9t s\u1ed1 c\u00f4ng ty \u0111\u00e3 \u0111\u01b0a ra c\u00e1c ch\u00ednh s\u00e1ch \u0111\u1ec3 \u0111\u1ea3m b\u1ea3o r\u1eb1ng c\u00e1c thi\u1ebft b\u1ecb v\u00e0 m\u00e1y m\u00f3c c\u1ee7a kh\u00e1ch h\u00e0ng ch\u1ec9 c\u00f3 th\u1ec3 k\u1ebft n\u1ed1i v\u1edbi m\u1ed9t s\u1ed1 m\u1ea1ng WIFI ho\u1eb7c m\u1ea1ng \u0111\u00e1ng tin c\u1eady, lo\u1ea1i b\u1ecf nguy c\u01a1 WIFI tr\u00e1i ph\u00e9p. Nh\u1eefng c\u00f4ng ty ch\u1ee7 \u0111\u1ed9ng nh\u1ea5t c\u0169ng \u0111\u00e3 chuy\u1ec3n sang <a href=\"https:\/\/www.globalsign.com\/en\/blog\/the-differences-between-certificate-based-and-pre-shared-key-authentication\/\" target=\"_blank\" rel=\"noreferrer noopener\">x\u00e1c th\u1ef1c d\u1ef1a tr\u00ean ch\u1ee9ng ch\u1ec9<\/a> \u0111\u1ec3 \u0111\u1ea3m b\u1ea3o ng\u01b0\u1eddi d\u00f9ng r\u1eb1ng b\u1ea3o m\u1eadt c\u1ee7a h\u1ecd lu\u00f4n \u0111\u01b0\u1ee3c b\u1ea3o v\u1ec7. Nh\u1eefng v\u00ed d\u1ee5 \u0111i\u1ec3n h\u00ecnh v\u1ec1 \u0111i\u1ec1u n\u00e0y c\u00f3 th\u1ec3 th\u1ea5y tr\u00ean ph\u1ed1 ch\u00ednh t\u1ea1i \u0111\u1ecba ph\u01b0\u01a1ng c\u1ee7a b\u1ea1n, n\u01a1i c\u00e1c nh\u00e0 b\u00e1n l\u1ebb \u0111\u1ea3m b\u1ea3o v\u1edbi kh\u00e1ch h\u00e0ng r\u1eb1ng h\u1ecd \u0111\u01b0\u1ee3c ch\u1ee9ng nh\u1eadn &#039;WiFi Friendly&#039;. \u0110\u00e2y l\u00e0 v\u00ed d\u1ee5 m\u00e0 c\u00e1c t\u1ed5 ch\u1ee9c doanh nghi\u1ec7p n\u00ean noi theo.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"best-practices-to-protect-yourself\">Th\u1ef1c h\u00e0nh t\u1ed1t nh\u1ea5t \u0111\u1ec3 b\u1ea3o v\u1ec7 b\u1ea3n th\u00e2n<\/h3>\n\n\n<p>Trong m\u1ed9t th\u1ebf gi\u1edbi m\u00e0 c\u1ea3 t\u00ednh di \u0111\u1ed9ng v\u00e0 k\u1ebft n\u1ed1i \u0111\u1ec1u tr\u1edf n\u00ean thi\u1ebft y\u1ebfu \u0111\u1ed1i v\u1edbi truy\u1ec1n th\u00f4ng to\u00e0n c\u1ea7u, WIFI l\u00e0 m\u1ed9t th\u00e0nh ph\u1ea7n quan tr\u1ecdng c\u1ee7a n\u01a1i l\u00e0m vi\u1ec7c k\u1ef9 thu\u1eadt s\u1ed1 v\u00e0 ng\u01b0\u1eddi d\u00f9ng hi\u1ec7n mong \u0111\u1ee3i \u0111i\u1ec1u \u0111\u00f3. Nh\u01b0ng h\u1ecd c\u0169ng mong mu\u1ed1n d\u1eef li\u1ec7u v\u00e0 truy\u1ec1n th\u00f4ng tr\u1ef1c tuy\u1ebfn c\u1ee7a m\u00ecnh \u0111\u01b0\u1ee3c an to\u00e0n tr\u01b0\u1edbc m\u1ed1i \u0111e d\u1ecda m\u1ea1ng c\u1ee7a c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng m\u1ea1ng.<\/p>\n\n\n\n<p>Sau \u0111\u00e2y l\u00e0 m\u1ed9t s\u1ed1 bi\u1ec7n ph\u00e1p t\u1ed1t nh\u1ea5t \u0111\u1ec3 b\u1ea3o v\u1ec7 b\u1ea1n kh\u1ecfi t\u1ed9i ph\u1ea1m m\u1ea1ng WIFI:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Tr\u00e1nh xa c\u00e1c trang web v\u00e0 tin nh\u1eafn \u0111\u00e1ng ng\u1edd.<\/li>\n\n\n\n<li>T\u1ea1o m\u1eadt kh\u1ea9u m\u1ea1nh, d\u00e0i, ph\u1ee9c t\u1ea1p v\u00e0 duy nh\u1ea5t.<\/li>\n\n\n\n<li>S\u1eed d\u1ee5ng tr\u00ecnh qu\u1ea3n l\u00fd m\u1eadt kh\u1ea9u t\u1eeb nh\u00e0 cung c\u1ea5p \u0111\u00e1ng tin c\u1eady.<\/li>\n\n\n\n<li>B\u1eadt x\u00e1c th\u1ef1c hai y\u1ebfu t\u1ed1 khi c\u00f3 th\u1ec3.<\/li>\n\n\n\n<li>Kh\u00f4ng bao gi\u1edd s\u1eed d\u1ee5ng l\u1ea1i m\u1eadt kh\u1ea9u cho nhi\u1ec1u h\u01a1n m\u1ed9t t\u00e0i kho\u1ea3n ho\u1eb7c d\u1ecbch v\u1ee5. N\u1ebfu m\u1eadt kh\u1ea9u c\u1ee7a b\u1ea1n b\u1ecb \u0111\u00e1nh c\u1eafp trong m\u1ed9t cu\u1ed9c t\u1ea5n c\u00f4ng, thi\u1ec7t h\u1ea1i s\u1ebd t\u0103ng g\u1ea5p b\u1ed9i v\u00ec ch\u00fang c\u00f3 th\u1ec3 truy c\u1eadp v\u00e0o nhi\u1ec1u t\u00e0i kho\u1ea3n kh\u00e1c nhau.<\/li>\n\n\n\n<li>Theo d\u00f5i t\u00e0i kho\u1ea3n ng\u00e2n h\u00e0ng v\u00e0 t\u00edn d\u1ee5ng c\u1ee7a b\u1ea1n th\u01b0\u1eddng xuy\u00ean \u0111\u1ec3 ph\u00e1t hi\u1ec7n ho\u1ea1t \u0111\u1ed9ng \u0111\u00e1ng ng\u1edd. \u0110i\u1ec1u n\u00e0y c\u00f3 th\u1ec3 gi\u00fap b\u1ea1n ph\u00e1t hi\u1ec7n ra m\u1ed9t cu\u1ed9c t\u1ea5n c\u00f4ng tr\u01b0\u1edbc khi n\u00f3 g\u00e2y thi\u1ec7t h\u1ea1i l\u1edbn \u0111\u1ebfn t\u00e0i ch\u00ednh ho\u1eb7c danh ti\u1ebfng c\u1ee7a b\u1ea1n. Ngo\u00e0i ra, h\u00e3y \u0111\u1eb7t gi\u1edbi h\u1ea1n cho c\u00e1c giao d\u1ecbch \u0111\u1ec3 ng\u0103n ch\u1eb7n vi\u1ec7c s\u1eed d\u1ee5ng sai m\u1ee5c \u0111\u00edch ti\u1ec1n c\u1ee7a b\u1ea1n.<\/li>\n\n\n\n<li>H\u00e3y c\u1ea9n th\u1eadn v\u1edbi th\u00f4ng tin b\u00ed m\u1eadt c\u1ee7a b\u1ea1n. N\u1ebfu b\u1ea1n mu\u1ed1n x\u00f3a c\u00e1c t\u00e0i li\u1ec7u c\u00f3 ch\u1ee9a th\u00f4ng tin c\u00e1 nh\u00e2n nh\u1ea1y c\u1ea3m, h\u00e3y \u0111\u1ea3m b\u1ea3o th\u1ef1c hi\u1ec7n theo c\u00e1ch an to\u00e0n, h\u1ee7y ch\u00fang \u0111\u1ec3 ch\u00fang kh\u00f4ng th\u1ec3 kh\u00f4i ph\u1ee5c \u0111\u01b0\u1ee3c. \u00c1p d\u1ee5ng c\u00f9ng m\u1ed9t nguy\u00ean t\u1eafc th\u00f4ng th\u01b0\u1eddng cho c\u00e1c thi\u1ebft b\u1ecb c\u1ee7a b\u1ea1n: khi b\u1ea1n v\u1ee9t b\u1ecf ho\u1eb7c b\u00e1n ch\u00fang, h\u00e3y \u0111\u1ea3m b\u1ea3o r\u1eb1ng b\u1ea1n kh\u00f4ng \u0111\u1ec3 l\u1ea1i d\u1ea5u v\u1ebft n\u00e0o v\u1ec1 th\u00f4ng tin nh\u1ea1y c\u1ea3m c\u1ee7a m\u00ecnh.<\/li>\n\n\n\n<li>\u0110\u1eebng chia s\u1ebb qu\u00e1 nhi\u1ec1u. Tr\u00e1nh \u0111\u0103ng th\u00f4ng tin chi ti\u1ebft v\u1ec1 cu\u1ed9c s\u1ed1ng c\u00e1 nh\u00e2n c\u1ee7a b\u1ea1n, v\u00ec \u0111i\u1ec1u n\u00e0y c\u00f3 th\u1ec3 b\u1ecb t\u1ed9i ph\u1ea1m l\u1ee3i d\u1ee5ng \u0111\u1ec3 h\u00e0nh \u0111\u1ed9ng thay m\u1eb7t b\u1ea1n.<\/li>\n<\/ul>\n\n\n\n<p>\u0110i\u1ec1u quan tr\u1ecdng n\u1eefa l\u00e0 ph\u1ea3i lu\u00f4n c\u1eadp nh\u1eadt c\u00e1c m\u1ed1i \u0111e d\u1ecda v\u00e0 xu h\u01b0\u1edbng m\u1ea1ng m\u1edbi nh\u1ea5t. T\u1ed9i ph\u1ea1m m\u1ea1ng lu\u00f4n thay \u0111\u1ed5i, v\u00e0 ki\u1ebfn th\u1ee9c c\u1ee7a b\u1ea1n v\u1ec1 c\u00e1ch b\u1ea3o v\u1ec7 b\u1ea3n th\u00e2n v\u00e0 t\u1ed5 ch\u1ee9c c\u1ee7a b\u1ea1n c\u0169ng v\u1eady. Tham gia <a href=\"https:\/\/www.nist.gov\/itl\/applied-cybersecurity\/nice\/resources\/cybersecurity-workforce-development\" target=\"_blank\" rel=\"noreferrer noopener\">ch\u01b0\u01a1ng tr\u00ecnh \u0111\u00e0o t\u1ea1o an ninh m\u1ea1ng<\/a> v\u00e0 vi\u1ec7c c\u1eadp nh\u1eadt nh\u1eefng chi\u1ebfn thu\u1eadt v\u00e0 c\u00f4ng ngh\u1ec7 m\u1edbi nh\u1ea5t c\u00f3 th\u1ec3 gi\u00fap ng\u0103n ch\u1eb7n hi\u1ec7u qu\u1ea3 c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng.<\/p>\n\n\n\n<p><strong>K\u1ebft lu\u1eadn<\/strong>, M\u1ea1ng WIFI l\u00e0 m\u1ed9t ph\u1ea7n ti\u1ec7n l\u1ee3i v\u00e0 thi\u1ebft y\u1ebfu c\u1ee7a cu\u1ed9c s\u1ed1ng hi\u1ec7n \u0111\u1ea1i, nh\u01b0ng ch\u00fang c\u0169ng g\u00e2y ra nh\u1eefng r\u1ee7i ro \u0111\u00e1ng k\u1ec3 cho t\u1ed9i ph\u1ea1m m\u1ea1ng. \u0110i\u1ec1u quan tr\u1ecdng l\u00e0 ph\u1ea3i nh\u1eadn th\u1ee9c \u0111\u01b0\u1ee3c nh\u1eefng r\u1ee7i ro n\u00e0y v\u00e0 th\u1ef1c hi\u1ec7n c\u00e1c b\u01b0\u1edbc \u0111\u1ec3 b\u1ea3o v\u1ec7 b\u1ea3n th\u00e2n v\u00e0 t\u1ed5 ch\u1ee9c c\u1ee7a b\u1ea1n. B\u1eb1ng c\u00e1ch tri\u1ec3n khai c\u00e1c bi\u1ec7n ph\u00e1p b\u1ea3o m\u1eadt ph\u00f9 h\u1ee3p, c\u1ea3nh gi\u00e1c v\u00e0 gi\u00e1o d\u1ee5c b\u1ea3n th\u00e2n v\u00e0 nh\u1eefng ng\u01b0\u1eddi kh\u00e1c, b\u1ea1n c\u00f3 th\u1ec3 gi\u1ea3m kh\u1ea3 n\u0103ng tr\u1edf th\u00e0nh n\u1ea1n nh\u00e2n c\u1ee7a t\u1ed9i ph\u1ea1m m\u1ea1ng WIFI.<\/p>","protected":false},"excerpt":{"rendered":"<p>An ninh m\u1ea1ng \u0111\u01b0\u1ee3c c\u00e1c t\u1eadp \u0111o\u00e0n v\u00e0 c\u00f4ng ty coi l\u00e0 \u01b0u ti\u00ean h\u00e0ng \u0111\u1ea7u v\u00e0 h\u1ecd \u0111ang \u0111\u1ea7u t\u01b0 \u0111\u00e1ng k\u1ec3 v\u00e0o t\u01b0\u1eddng l\u1eeda cho ph\u00e9p h\u1ec7 th\u1ed1ng c\u1ee7a h\u1ecd kh\u00f4ng th\u1ec3 truy c\u1eadp \u0111\u01b0\u1ee3c m\u1ed9t c\u00e1ch hi\u1ec7u qu\u1ea3. Tuy nhi\u00ean, nhi\u1ec1u c\u00f4ng ty trong s\u1ed1 n\u00e0y\u2026 <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/vi\/cong-nghe-2\/toi-pham-mang-qua-wifi-nhung-dieu-ban-can-biet\/\">Ti\u1ebfp t\u1ee5c \u0111\u1ecdc <span class=\"screen-reader-text\">T\u1ed9i ph\u1ea1m m\u1ea1ng th\u00f4ng qua WiFi: Nh\u1eefng \u0111i\u1ec1u b\u1ea1n c\u1ea7n bi\u1ebft<\/span><\/a><\/p>","protected":false},"author":3,"featured_media":1514,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[31],"tags":[],"class_list":["post-1504","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technology","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Protecting Yourself from Cybercrime through WIFI<\/title>\n<meta name=\"description\" content=\"Protect yourself and your organization from WIFI cybercrime. Learn how to stay safe from MITM attacks with our expert tips.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/vi\/cong-nghe-2\/toi-pham-mang-qua-wifi-nhung-dieu-ban-can-biet\/\" \/>\n<meta property=\"og:locale\" content=\"vi_VN\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Protecting Yourself from Cybercrime through WIFI\" \/>\n<meta property=\"og:description\" content=\"Protect yourself and your organization from WIFI cybercrime. Learn how to stay safe from MITM attacks with our expert tips.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/vi\/cong-nghe-2\/toi-pham-mang-qua-wifi-nhung-dieu-ban-can-biet\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-25T14:46:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Cybercrime-Through-WiFi-What-You-Need-To-Know-min-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"760\" \/>\n\t<meta property=\"og:image:height\" content=\"388\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"C\u00e9sar Daniel Barreto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u0110\u01b0\u1ee3c vi\u1ebft b\u1edfi\" \/>\n\t<meta name=\"twitter:data1\" content=\"C\u00e9sar Daniel Barreto\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u01af\u1edbc t\u00ednh th\u1eddi gian \u0111\u1ecdc\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 ph\u00fat\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/technology\/cybercrime-through-wifi-what-you-need-to-know\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/technology\/cybercrime-through-wifi-what-you-need-to-know\/\"},\"author\":{\"name\":\"C\u00e9sar Daniel Barreto\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\"},\"headline\":\"Cybercrime Through WiFi: What You Need to Know\",\"datePublished\":\"2023-02-25T14:46:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/technology\/cybercrime-through-wifi-what-you-need-to-know\/\"},\"wordCount\":1468,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/technology\/cybercrime-through-wifi-what-you-need-to-know\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Cybercrime-Through-WiFi-What-You-Need-To-Know-min-1.jpg\",\"articleSection\":[\"Technology\"],\"inLanguage\":\"vi\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/technology\/cybercrime-through-wifi-what-you-need-to-know\/\",\"url\":\"https:\/\/securitybriefing.net\/technology\/cybercrime-through-wifi-what-you-need-to-know\/\",\"name\":\"Protecting Yourself from Cybercrime through WIFI\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/technology\/cybercrime-through-wifi-what-you-need-to-know\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/technology\/cybercrime-through-wifi-what-you-need-to-know\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Cybercrime-Through-WiFi-What-You-Need-To-Know-min-1.jpg\",\"datePublished\":\"2023-02-25T14:46:21+00:00\",\"description\":\"Protect yourself and your organization from WIFI cybercrime. Learn how to stay safe from MITM attacks with our expert tips.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/technology\/cybercrime-through-wifi-what-you-need-to-know\/#breadcrumb\"},\"inLanguage\":\"vi\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/technology\/cybercrime-through-wifi-what-you-need-to-know\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"vi\",\"@id\":\"https:\/\/securitybriefing.net\/technology\/cybercrime-through-wifi-what-you-need-to-know\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Cybercrime-Through-WiFi-What-You-Need-To-Know-min-1.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Cybercrime-Through-WiFi-What-You-Need-To-Know-min-1.jpg\",\"width\":760,\"height\":388,\"caption\":\"Cybercrime Through WiFi What You Need To Know\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/technology\/cybercrime-through-wifi-what-you-need-to-know\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybercrime Through WiFi: What You Need to Know\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"vi\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"vi\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\",\"name\":\"C\u00e9sar Daniel Barreto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"vi\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"caption\":\"C\u00e9sar Daniel Barreto\"},\"description\":\"C\u00e9sar Daniel Barreto is an esteemed cybersecurity writer and expert, known for his in-depth knowledge and ability to simplify complex cyber security topics. With extensive experience in network security and data protection, he regularly contributes insightful articles and analysis on the latest cybersecurity trends, educating both professionals and the public.\",\"url\":\"https:\/\/securitybriefing.net\/vi\/author\/cesarbarreto\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"B\u1ea3o v\u1ec7 b\u1ea3n th\u00e2n kh\u1ecfi t\u1ed9i ph\u1ea1m m\u1ea1ng th\u00f4ng qua WIFI","description":"B\u1ea3o v\u1ec7 b\u1ea3n th\u00e2n v\u00e0 t\u1ed5 ch\u1ee9c c\u1ee7a b\u1ea1n kh\u1ecfi t\u1ed9i ph\u1ea1m m\u1ea1ng WIFI. T\u00ecm hi\u1ec3u c\u00e1ch gi\u1eef an to\u00e0n kh\u1ecfi c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng MITM v\u1edbi c\u00e1c m\u1eb9o chuy\u00ean gia c\u1ee7a ch\u00fang t\u00f4i.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/vi\/cong-nghe-2\/toi-pham-mang-qua-wifi-nhung-dieu-ban-can-biet\/","og_locale":"vi_VN","og_type":"article","og_title":"Protecting Yourself from Cybercrime through WIFI","og_description":"Protect yourself and your organization from WIFI cybercrime. Learn how to stay safe from MITM attacks with our expert tips.","og_url":"https:\/\/securitybriefing.net\/vi\/cong-nghe-2\/toi-pham-mang-qua-wifi-nhung-dieu-ban-can-biet\/","og_site_name":"Security Briefing","article_published_time":"2023-02-25T14:46:21+00:00","og_image":[{"width":760,"height":388,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Cybercrime-Through-WiFi-What-You-Need-To-Know-min-1.jpg","type":"image\/jpeg"}],"author":"C\u00e9sar Daniel Barreto","twitter_card":"summary_large_image","twitter_misc":{"\u0110\u01b0\u1ee3c vi\u1ebft b\u1edfi":"C\u00e9sar Daniel Barreto","\u01af\u1edbc t\u00ednh th\u1eddi gian \u0111\u1ecdc":"7 ph\u00fat"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/technology\/cybercrime-through-wifi-what-you-need-to-know\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/technology\/cybercrime-through-wifi-what-you-need-to-know\/"},"author":{"name":"C\u00e9sar Daniel Barreto","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c"},"headline":"Cybercrime Through WiFi: What You Need to Know","datePublished":"2023-02-25T14:46:21+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/technology\/cybercrime-through-wifi-what-you-need-to-know\/"},"wordCount":1468,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/technology\/cybercrime-through-wifi-what-you-need-to-know\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Cybercrime-Through-WiFi-What-You-Need-To-Know-min-1.jpg","articleSection":["Technology"],"inLanguage":"vi"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/technology\/cybercrime-through-wifi-what-you-need-to-know\/","url":"https:\/\/securitybriefing.net\/technology\/cybercrime-through-wifi-what-you-need-to-know\/","name":"B\u1ea3o v\u1ec7 b\u1ea3n th\u00e2n kh\u1ecfi t\u1ed9i ph\u1ea1m m\u1ea1ng th\u00f4ng qua WIFI","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/technology\/cybercrime-through-wifi-what-you-need-to-know\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/technology\/cybercrime-through-wifi-what-you-need-to-know\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Cybercrime-Through-WiFi-What-You-Need-To-Know-min-1.jpg","datePublished":"2023-02-25T14:46:21+00:00","description":"B\u1ea3o v\u1ec7 b\u1ea3n th\u00e2n v\u00e0 t\u1ed5 ch\u1ee9c c\u1ee7a b\u1ea1n kh\u1ecfi t\u1ed9i ph\u1ea1m m\u1ea1ng WIFI. T\u00ecm hi\u1ec3u c\u00e1ch gi\u1eef an to\u00e0n kh\u1ecfi c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng MITM v\u1edbi c\u00e1c m\u1eb9o chuy\u00ean gia c\u1ee7a ch\u00fang t\u00f4i.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/technology\/cybercrime-through-wifi-what-you-need-to-know\/#breadcrumb"},"inLanguage":"vi","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/technology\/cybercrime-through-wifi-what-you-need-to-know\/"]}]},{"@type":"ImageObject","inLanguage":"vi","@id":"https:\/\/securitybriefing.net\/technology\/cybercrime-through-wifi-what-you-need-to-know\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Cybercrime-Through-WiFi-What-You-Need-To-Know-min-1.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Cybercrime-Through-WiFi-What-You-Need-To-Know-min-1.jpg","width":760,"height":388,"caption":"Cybercrime Through WiFi What You Need To Know"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/technology\/cybercrime-through-wifi-what-you-need-to-know\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"Cybercrime Through WiFi: What You Need to Know"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"B\u00e1o C\u00e1o An Ninh","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"vi"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"B\u00e1o C\u00e1o An Ninh","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"vi","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c","name":"<\/section>","image":{"@type":"ImageObject","inLanguage":"vi","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","caption":"C\u00e9sar Daniel Barreto"},"description":"C\u00e9sar Daniel Barreto l\u00e0 m\u1ed9t nh\u00e0 v\u0103n v\u00e0 chuy\u00ean gia an ninh m\u1ea1ng \u0111\u01b0\u1ee3c k\u00ednh tr\u1ecdng, n\u1ed5i ti\u1ebfng v\u1edbi ki\u1ebfn th\u1ee9c s\u00e2u r\u1ed9ng v\u00e0 kh\u1ea3 n\u0103ng \u0111\u01a1n gi\u1ea3n h\u00f3a c\u00e1c ch\u1ee7 \u0111\u1ec1 an ninh m\u1ea1ng ph\u1ee9c t\u1ea1p. V\u1edbi kinh nghi\u1ec7m s\u00e2u r\u1ed9ng v\u1ec1 b\u1ea3o m\u1eadt m\u1ea1ng v\u00e0 b\u1ea3o v\u1ec7 d\u1eef li\u1ec7u, \u00f4ng th\u01b0\u1eddng xuy\u00ean \u0111\u00f3ng g\u00f3p c\u00e1c b\u00e0i vi\u1ebft v\u00e0 ph\u00e2n t\u00edch s\u00e2u s\u1eafc v\u1ec1 c\u00e1c xu h\u01b0\u1edbng an ninh m\u1ea1ng m\u1edbi nh\u1ea5t, gi\u00e1o d\u1ee5c c\u1ea3 chuy\u00ean gia v\u00e0 c\u00f4ng ch\u00fang.","url":"https:\/\/securitybriefing.net\/vi\/author\/cesarbarreto\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/posts\/1504","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/comments?post=1504"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/posts\/1504\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/media\/1514"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/media?parent=1504"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/categories?post=1504"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/tags?post=1504"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}