First thought - push a GPO that only allows browsers to work using a proxy on the far end of a VPN. But if the hotspot requires user intervention of some form to gain access, then no good.
Second thought - disable javascript in your browser. Third thought - set the cache/cookies/etc to auto-clear every time you close your browser, similar to the 'in-private' mode of IE. Still potentially can infect during the session at the hotspot. Fourth thought - SSL authentication to the captive portal. ...just off the top of my head. -----Original Message----- From: [email protected] [mailto:[email protected]] On Behalf Of Drew Sent: Thursday, February 04, 2010 5:23 PM To: SoCalFreeNet.org General Discussion List Subject: [SCFN] How Wi-Fi attackers are poisoning Web browsers Anyone have any insight or experience with this? http://www.networkworld.com/news/2010/020310-black-hat-wi-fi-attackers.html _______________________________________________ SoCalFreeNet.org General Discussion List To unsubscribe, please visit: http://socalfreenet.org/mailman/listinfo/discuss_socalfreenet.org _______________________________________________ SoCalFreeNet.org General Discussion List To unsubscribe, please visit: http://socalfreenet.org/mailman/listinfo/discuss_socalfreenet.org
