: How the aggregators work"> Infonet and FiberLink have added features to Boingos client that both companies license. "There are a number of ways where the UAM can be replicated or scammed. Evil Twin is the newest iteration of it," said Christian Gunning, director of product management at Boingo. When a user logs in, Boingo validates that the access point is a member of its network. If its not, the user gets a failed authentication notice.iPass Secure Connect automatically launches a personal firewall. Its iSEEL encrypts logon credentials through authentication when VPN encryption is launched. Chris Churilo, director of product marketing at iPass, said if phishers are looking for credit card information, "theyll be a little bit disappointed the only thing they could actually do is get onto the Internet." Click here to read more about the iPass mobile security platform. Last year, the Wi-Fi Alliance endorsed the Wireless ISP Roaming specification to define a roaming model that aims to pull service providers more directly into the mix and bring WPA authentication security technologies into public hot spots as they, and their customer users, upgrade equipment. "If we make the assumption going forward that more and more users will have WPA-enabled clients on their devices, the easier the roaming challenge becomes because you have a standardized protocol for securing and transmitting the information among parties," Hayes said. Already, he said, were seeing "a kind of a horse race among providers over the number of hot spots in their networks." And thats good news to users who find Wi-Fi connectivity increasingly available to them no matter what provider they subscribe to. Check out eWEEK.coms for the latest news, reviews and analysis on mobile and wireless computing.
"The first thing we do is validate the certificate of that access point to certify that who we think were talking to is actually who were talking to," said Howard Pressman, manager of wireless solutions at Fiberlink.