Group Purchasing
Group Purchasing

Who do you trust?

Who do you trust? (PDF, 1.63MB)Published: 03 Aug, 2011
Created by:
Matthew Luallen

Imagine this scenario: a woman is enjoying a cup of coffee at her favorite Wi-Fi hotspot, and uses her iPad to check her email. As she starts to login to Gmail, she doesn't realize that the man sitting a few tables over, apparently working on his laptop, has intercepted her login and is pretending to be Gmail in an effort to capture her user name and password.