Dangerous Wi-Fi Access Point: Attacks to Benign Smartphone Applications Paper by Min-Woo Park, Young-Hyun Choi, Jung-Ho Eom, and Tai-Myoung Chung Presentation by Josh Privett Methods of Accessing Internet on Smartphones Room for Malicious Behavior What is next? Changes need to be made to prevent this type of backdoor from occurring as easily Users should be safer when using Access Points without having to be able to identify legitimate and fraudulent points. Works Cited Digital image. Aalborg University. N.p., n.d. Web. Digital image. OWASP. N.p., n.d. Web.