These attacks could be used to gather information such as login credentials - useful for attacks against individuals directly, or companies posing as legitimate users.It is clear that while wireless network popularity has grown, their accessibility requires appropriate segregation to be in place.