Put it this way, if they wanted your information, they'ed get it, regardless of what wireless security you had.
1 find out where you hang out online, like ISS.
2 ingratiate themselves to your circle of friendship, ask for help on a few astro topics.
3 send you a malicious payload in PM tailored to the IT infrastructure you have previously told everyone about win/Mac/linux- click here and have a look a my website that describes my issue, or here is a PDF in which I have been keeping track of my problem.
4 Yhey now own your computer, they infect every all other devices they can on your network within 3 mins.
5 They tell all their software to go to sleep for 2 months.
6 They start up and collect your info and send it their C&C server at regular intervals.
And they did all of this from 10,000kms away from your "secured" wireless access point, and your Antivirus program didn't bleep once during the whole affair.
|