On Thu, May 17, 2012 at 9:38 AM, Smylers <smyl...@stripey.com> wrote:
> Fantastic. A wi-fi hotspot has substituted a redirect to its log-in page
> for the file requested, serving it with an 200 status header, and so
> giving the impression that the payload is indeed the requested file.

aren't you glad you were not a victim of

http://www.h-online.com/security/news/item/FBI-hotel-hotspots-used-to-spread-malware-1571596.html

cheers

Reply via email to