From the abstract:
"This article will discuss common approaches used to secure wireless hotspots and their weaknesses. It includes suggestions for secure hotspot use, and a glimpse into what the future of wireless hotspot security could look like."
The good folks over at ISSA have given me permission to post the article. It is attached to this article.
(Originally published 2011-03-01)