The other activity is WiFi hunting. Similar to war-driving, criminals will bring portable wireless scanning devices into a Starbucks that search for open laptop ports. Once an open port is located, scripts and other Trojans are downloaded onto the unsuspecting person's laptop. The next time they log on somewhere, the script and its payloadkeylogger, botnet, virus, whateverlaunch.
"In one instance it started because they couldn't get a meeting room in their offices so they said, 'Let's just go to Starbucks down the street.' And then it became a habit and, unfortunately, patterns are things criminals look for," said Adams. And, even more unfortunate, this particular group got up togetherleaving their gear unattendedto order.
To thwart these persistent and inventive spooks, Berkuta suggests three basic security measures:
"Each (security measure) has a weakness and a strength," said Berkuta. "In concert with each other, when they work together, you have a pretty resilient system to keep you laptop in a pretty secured fashion."