{"componentChunkName":"component---src-templates-dictionary-term-tsx","path":"/dictionary/over-the-air-attack","result":{"data":{"contentfulDictionaryTerm":{"title":"Over-the-air attack","slug":"over-the-air-attack","descriptionMeta":{"childMarkdownRemark":{"rawMarkdownBody":"Learn to safeguard your devices against sneaky \"over-the-air\" attacks, which exploit wireless communication vulnerabilities in Wi-Fi, Bluetooth, and cellular networks. Discover the mechanisms of these attacks, real-world examples, and effective defenses to protect your data and privacy."}},"body":{"body":"# Over-the-air attack\nAn \"over-the-air\" (OTA) attack is when scammers take advantage of vulnerabilities in wireless communication technologies like Wi-Fi, Bluetooth, and cellular networks to intercept, manipulate, or gain unauthorized access to data transmissions. These attacks can be especially sneaky and hard to catch because they don't require physical access to the target device.\n\n#### Example of an OTA attack:\nA type of over-the-air attack is a [man-in-the-middle (MITM) attack](https://guard.io/dictionary/man-in-the-middle-attack \"Guardio Dictionary - What's a man in the middle attack?\"), where a scammer intercepts and potentially alters the communication between two people who think they’re directly interacting with each other. Imagine using public Wi-Fi while you’re sitting at a coffee shop or airport a place where you wouldn’t normally think of security risks. That’s exactly the playground scammers look for to exploit unsuspecting people.\n\n#### This is how the attack would unfold:\nFinding an access point: The attacker sets up a Wi-Fi hotspot with a name similar to the legitimate one provided by the coffee shop. This hotspot might be named something slightly different, like \"Coffee_Shop_Free_WiFi2.\"\n\n- __Connection interception:__ Unsuspecting users connect to the attacker’s network, thinking it's the legitimate one. Once connected, all their internet traffic flows through the attacker's device.\n\n- __Data interception and manipulation:__ As data passes through the rogue network, the attacker can use sniffing tools to intercept sensitive information such as passwords, credit card numbers, and personal emails. The attacker can also alter the data being sent or received, injecting malware or redirecting the user to [phishing sites](https://guard.io/blog/phishing-explained-everything-you-need-to-know-about-phishing-scams#how-can-i-protect-myself-from-phi10-paypal-scams-to-watch-outshing-emails \"Guardio Blog - Don't Take the Bait: Your Guide to Phishing Email Protection\").\n\n![Over the air attack](//images.ctfassets.net/18tcvm6gnkis/43IobJLpypDuxtPIBqyrvQ/d1362a066c5bf4656c6f21f55d8cf86d/shutterstock_1188081664-min.jpg)\n\n#### Potential consequences\n- __Identity theft:__ The stolen credentials can be used to gain unauthorized access to personal accounts, leading to identity theft.\n\n- __Financial loss:__ Credit card details and banking information intercepted during the attack can be used for unauthorized purchases or withdrawals.\n\n- __Privacy breach:__ Personal emails, messages, and other sensitive information can be accessed, leading to privacy violations.\n\n- __Malware infection:__ Malware can be injected into data being downloaded by the victim, leading to further exploitation, like ransomware attacks or long-term surveillance through spyware.\n\n#### Defense against OTA attacks\nThere a number of preventative measures you can take to protect yourself against OTA attacks:\n\n__Enable HTTPS:__ Ensure that all websites you visit use HTTPS not HTTP (a non secure protocol.) HTTPS encrypts the data exchanged between your browser and the website, protecting it from eavesdroppers.\n\n__Verify network authenticity:__ Be cautious about connecting to public Wi-Fi networks. Verify the network name with the establishment providing the Wi-Fi service and avoid conducting sensitive transactions over public networks.\n\n__Keep software updated:__ Regularly update your device's software and firmware to protect against known vulnerabilities that could be exploited in OTA attacks.\n\n__Use VPNs:__ Always use a virtual private network (VPN) when connecting to public Wi-Fi. A VPN encrypts all data leaving your device, making it difficult for attackers to intercept or manipulate it.\n\n__Use cybersecurity software:__ Implement powerful cybersecurity software like [Guardio](https://guard.io/plans \"Guardio Plans page\") to monitor and block suspicious activities and sites in real-time, further securing your online presence from various cyber threats.\n\nUnderstanding the mechanisms of OTA attacks and implementing robust security practices, you can significantly reduce your vulnerability to these invisible yet potentially devastating threats.\n\n![Secure vs unsecure icon](//images.ctfassets.net/18tcvm6gnkis/1SvZ26RcZsGwlBmeYGHvGb/a9b749f98b26ba392931a7c76abc36bf/Secure_-_unsecure_icon.jpg)\n\n#### Staying Safe\nGuardio can keep you protected from over the air attacks and other online scams. It stops phishing attempts, secures your accounts, and keeps you informed about potential breaches.\n\n#### Why Guardio?\nGuardio is your ally in the digital age, offering tools and alerts to keep scammers at bay. Try it out with a [7-day free trial](https://guard.io/plans \"Guardio Plans page\") and see how it enhances your online security.\n\nIn summary, OTA attacks is a method scammer's use to take over your device and steal your information. But with the right set of tools and [Guardio’s comprehensive protection](https://guard.io/plans \"Guardio Plans page\"), you can secure your digital realm.","childMarkdownRemark":{"htmlAst":{"type":"root","children":[{"type":"element","tagName":"h1","properties":{"id":"over-the-air-attack","style":"position:relative;"},"children":[{"type":"text","value":"Over-the-air attack"},{"type":"element","tagName":"a","properties":{"href":"#over-the-air-attack","ariaLabel":"over the air attack permalink","className":["anchor","after"]},"children":[{"type":"element","tagName":"svg","properties":{"ariaHidden":"true","focusable":"false","height":"16","version":"1.1","viewBox":"0 0 16 16","width":"16"},"children":[{"type":"element","tagName":"path","properties":{"fillRule":"evenodd","d":"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z"},"children":[]}]}]}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"An \"over-the-air\" (OTA) attack is when scammers take advantage of vulnerabilities in wireless communication technologies like Wi-Fi, Bluetooth, and cellular networks to intercept, manipulate, or gain unauthorized access to data transmissions. These attacks can be especially sneaky and hard to catch because they don't require physical access to the target device."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"h4","properties":{"id":"example-of-an-ota-attack","style":"position:relative;"},"children":[{"type":"text","value":"Example of an OTA attack:"},{"type":"element","tagName":"a","properties":{"href":"#example-of-an-ota-attack","ariaLabel":"example of an ota attack permalink","className":["anchor","after"]},"children":[{"type":"element","tagName":"svg","properties":{"ariaHidden":"true","focusable":"false","height":"16","version":"1.1","viewBox":"0 0 16 16","width":"16"},"children":[{"type":"element","tagName":"path","properties":{"fillRule":"evenodd","d":"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z"},"children":[]}]}]}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"A type of over-the-air attack is a "},{"type":"element","tagName":"a","properties":{"href":"https://guard.io/dictionary/man-in-the-middle-attack","title":"Guardio Dictionary - What's a man in the middle attack?"},"children":[{"type":"text","value":"man-in-the-middle (MITM) attack"}]},{"type":"text","value":", where a scammer intercepts and potentially alters the communication between two people who think they’re directly interacting with each other. Imagine using public Wi-Fi while you’re sitting at a coffee shop or airport a place where you wouldn’t normally think of security risks. That’s exactly the playground scammers look for to exploit unsuspecting people."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"h4","properties":{"id":"this-is-how-the-attack-would-unfold","style":"position:relative;"},"children":[{"type":"text","value":"This is how the attack would unfold:"},{"type":"element","tagName":"a","properties":{"href":"#this-is-how-the-attack-would-unfold","ariaLabel":"this is how the attack would unfold permalink","className":["anchor","after"]},"children":[{"type":"element","tagName":"svg","properties":{"ariaHidden":"true","focusable":"false","height":"16","version":"1.1","viewBox":"0 0 16 16","width":"16"},"children":[{"type":"element","tagName":"path","properties":{"fillRule":"evenodd","d":"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z"},"children":[]}]}]}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Finding an access point: The attacker sets up a Wi-Fi hotspot with a name similar to the legitimate one provided by the coffee shop. This hotspot might be named something slightly different, like \"Coffee_Shop_Free_WiFi2.\""}]},{"type":"text","value":"\n"},{"type":"element","tagName":"ul","properties":{},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"li","properties":{},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"Connection interception:"}]},{"type":"text","value":" Unsuspecting users connect to the attacker’s network, thinking it's the legitimate one. Once connected, all their internet traffic flows through the attacker's device."}]},{"type":"text","value":"\n"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"li","properties":{},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"Data interception and manipulation:"}]},{"type":"text","value":" As data passes through the rogue network, the attacker can use sniffing tools to intercept sensitive information such as passwords, credit card numbers, and personal emails. The attacker can also alter the data being sent or received, injecting malware or redirecting the user to "},{"type":"element","tagName":"a","properties":{"href":"https://guard.io/blog/phishing-explained-everything-you-need-to-know-about-phishing-scams#how-can-i-protect-myself-from-phi10-paypal-scams-to-watch-outshing-emails","title":"Guardio Blog - Don't Take the Bait: Your Guide to Phishing Email Protection"},"children":[{"type":"text","value":"phishing sites"}]},{"type":"text","value":"."}]},{"type":"text","value":"\n"}]},{"type":"text","value":"\n"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"span","properties":{"className":["gatsby-resp-image-wrapper"],"style":"position: relative; display: block; ; max-width: 500px; margin-left: auto; margin-right: auto;"},"children":[{"type":"text","value":"\n "},{"type":"element","tagName":"span","properties":{"className":["gatsby-resp-image-background-image"],"style":"padding-bottom: 61%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;"},"children":[{"type":"text","value":"\n "},{"type":"element","tagName":"img","properties":{"className":["gatsby-resp-image-image"],"style":"width: 100%; height: 100%; margin: 0; vertical-align: middle; position: absolute; top: 0; left: 0; box-shadow: inset 0px 0px 0px 400px white;","alt":"Over the air attack","title":"","src":"https://images.ctfassets.net/18tcvm6gnkis/43IobJLpypDuxtPIBqyrvQ/d1362a066c5bf4656c6f21f55d8cf86d/shutterstock_1188081664-min.jpg","srcSet":["https://images.ctfassets.net/18tcvm6gnkis/43IobJLpypDuxtPIBqyrvQ/d1362a066c5bf4656c6f21f55d8cf86d/shutterstock_1188081664-min.jpg?w=125 125w","https://images.ctfassets.net/18tcvm6gnkis/43IobJLpypDuxtPIBqyrvQ/d1362a066c5bf4656c6f21f55d8cf86d/shutterstock_1188081664-min.jpg?w=250 250w","https://images.ctfassets.net/18tcvm6gnkis/43IobJLpypDuxtPIBqyrvQ/d1362a066c5bf4656c6f21f55d8cf86d/shutterstock_1188081664-min.jpg?w=500 500w"],"sizes":"(max-width: 500px) 100vw, 500px","loading":"lazy"},"children":[]},{"type":"text","value":"\n "}]},{"type":"text","value":"\n "}]}]},{"type":"text","value":"\n"},{"type":"element","tagName":"h4","properties":{"id":"potential-consequences","style":"position:relative;"},"children":[{"type":"text","value":"Potential consequences"},{"type":"element","tagName":"a","properties":{"href":"#potential-consequences","ariaLabel":"potential consequences permalink","className":["anchor","after"]},"children":[{"type":"element","tagName":"svg","properties":{"ariaHidden":"true","focusable":"false","height":"16","version":"1.1","viewBox":"0 0 16 16","width":"16"},"children":[{"type":"element","tagName":"path","properties":{"fillRule":"evenodd","d":"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z"},"children":[]}]}]}]},{"type":"text","value":"\n"},{"type":"element","tagName":"ul","properties":{},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"li","properties":{},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"Identity theft:"}]},{"type":"text","value":" The stolen credentials can be used to gain unauthorized access to personal accounts, leading to identity theft."}]},{"type":"text","value":"\n"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"li","properties":{},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"Financial loss:"}]},{"type":"text","value":" Credit card details and banking information intercepted during the attack can be used for unauthorized purchases or withdrawals."}]},{"type":"text","value":"\n"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"li","properties":{},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"Privacy breach:"}]},{"type":"text","value":" Personal emails, messages, and other sensitive information can be accessed, leading to privacy violations."}]},{"type":"text","value":"\n"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"li","properties":{},"children":[{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"Malware infection:"}]},{"type":"text","value":" Malware can be injected into data being downloaded by the victim, leading to further exploitation, like ransomware attacks or long-term surveillance through spyware."}]},{"type":"text","value":"\n"}]},{"type":"text","value":"\n"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"h4","properties":{"id":"defense-against-ota-attacks","style":"position:relative;"},"children":[{"type":"text","value":"Defense against OTA attacks"},{"type":"element","tagName":"a","properties":{"href":"#defense-against-ota-attacks","ariaLabel":"defense against ota attacks permalink","className":["anchor","after"]},"children":[{"type":"element","tagName":"svg","properties":{"ariaHidden":"true","focusable":"false","height":"16","version":"1.1","viewBox":"0 0 16 16","width":"16"},"children":[{"type":"element","tagName":"path","properties":{"fillRule":"evenodd","d":"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z"},"children":[]}]}]}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"There a number of preventative measures you can take to protect yourself against OTA attacks:"}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"Enable HTTPS:"}]},{"type":"text","value":" Ensure that all websites you visit use HTTPS not HTTP (a non secure protocol.) HTTPS encrypts the data exchanged between your browser and the website, protecting it from eavesdroppers."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"Verify network authenticity:"}]},{"type":"text","value":" Be cautious about connecting to public Wi-Fi networks. Verify the network name with the establishment providing the Wi-Fi service and avoid conducting sensitive transactions over public networks."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"Keep software updated:"}]},{"type":"text","value":" Regularly update your device's software and firmware to protect against known vulnerabilities that could be exploited in OTA attacks."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"Use VPNs:"}]},{"type":"text","value":" Always use a virtual private network (VPN) when connecting to public Wi-Fi. A VPN encrypts all data leaving your device, making it difficult for attackers to intercept or manipulate it."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"strong","properties":{},"children":[{"type":"text","value":"Use cybersecurity software:"}]},{"type":"text","value":" Implement powerful cybersecurity software like "},{"type":"element","tagName":"a","properties":{"href":"https://guard.io/plans","title":"Guardio Plans page"},"children":[{"type":"text","value":"Guardio"}]},{"type":"text","value":" to monitor and block suspicious activities and sites in real-time, further securing your online presence from various cyber threats."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Understanding the mechanisms of OTA attacks and implementing robust security practices, you can significantly reduce your vulnerability to these invisible yet potentially devastating threats."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"element","tagName":"span","properties":{"className":["gatsby-resp-image-wrapper"],"style":"position: relative; display: block; ; max-width: 400px; margin-left: auto; margin-right: auto;"},"children":[{"type":"text","value":"\n "},{"type":"element","tagName":"span","properties":{"className":["gatsby-resp-image-background-image"],"style":"padding-bottom: 83.50000000000001%; position: relative; bottom: 0; left: 0; background-image: url('data:image/jpeg;base64,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'); background-size: cover; display: block;"},"children":[{"type":"text","value":"\n "},{"type":"element","tagName":"img","properties":{"className":["gatsby-resp-image-image"],"style":"width: 100%; height: 100%; margin: 0; vertical-align: middle; position: absolute; top: 0; left: 0; box-shadow: inset 0px 0px 0px 400px white;","alt":"Secure vs unsecure icon","title":"","src":"https://images.ctfassets.net/18tcvm6gnkis/1SvZ26RcZsGwlBmeYGHvGb/a9b749f98b26ba392931a7c76abc36bf/Secure_-_unsecure_icon.jpg","srcSet":["https://images.ctfassets.net/18tcvm6gnkis/1SvZ26RcZsGwlBmeYGHvGb/a9b749f98b26ba392931a7c76abc36bf/Secure_-_unsecure_icon.jpg?w=100 100w","https://images.ctfassets.net/18tcvm6gnkis/1SvZ26RcZsGwlBmeYGHvGb/a9b749f98b26ba392931a7c76abc36bf/Secure_-_unsecure_icon.jpg?w=200 200w","https://images.ctfassets.net/18tcvm6gnkis/1SvZ26RcZsGwlBmeYGHvGb/a9b749f98b26ba392931a7c76abc36bf/Secure_-_unsecure_icon.jpg?w=400 400w"],"sizes":"(max-width: 400px) 100vw, 400px","loading":"lazy"},"children":[]},{"type":"text","value":"\n "}]},{"type":"text","value":"\n "}]}]},{"type":"text","value":"\n"},{"type":"element","tagName":"h4","properties":{"id":"staying-safe","style":"position:relative;"},"children":[{"type":"text","value":"Staying Safe"},{"type":"element","tagName":"a","properties":{"href":"#staying-safe","ariaLabel":"staying safe permalink","className":["anchor","after"]},"children":[{"type":"element","tagName":"svg","properties":{"ariaHidden":"true","focusable":"false","height":"16","version":"1.1","viewBox":"0 0 16 16","width":"16"},"children":[{"type":"element","tagName":"path","properties":{"fillRule":"evenodd","d":"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z"},"children":[]}]}]}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Guardio can keep you protected from over the air attacks and other online scams. It stops phishing attempts, secures your accounts, and keeps you informed about potential breaches."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"h4","properties":{"id":"why-guardio","style":"position:relative;"},"children":[{"type":"text","value":"Why Guardio?"},{"type":"element","tagName":"a","properties":{"href":"#why-guardio","ariaLabel":"why guardio permalink","className":["anchor","after"]},"children":[{"type":"element","tagName":"svg","properties":{"ariaHidden":"true","focusable":"false","height":"16","version":"1.1","viewBox":"0 0 16 16","width":"16"},"children":[{"type":"element","tagName":"path","properties":{"fillRule":"evenodd","d":"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z"},"children":[]}]}]}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"Guardio is your ally in the digital age, offering tools and alerts to keep scammers at bay. Try it out with a "},{"type":"element","tagName":"a","properties":{"href":"https://guard.io/plans","title":"Guardio Plans page"},"children":[{"type":"text","value":"7-day free trial"}]},{"type":"text","value":" and see how it enhances your online security."}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"In summary, OTA attacks is a method scammer's use to take over your device and steal your information. But with the right set of tools and "},{"type":"element","tagName":"a","properties":{"href":"https://guard.io/plans","title":"Guardio Plans page"},"children":[{"type":"text","value":"Guardio’s comprehensive protection"}]},{"type":"text","value":", you can secure your digital realm."}]}],"data":{"quirksMode":false}}}}}},"pageContext":{"title":"Over-the-air attack","slug":"over-the-air-attack","keepLearning":[{"title":"Packet","slug":"packet"},{"title":"Parasitic Viruses","slug":"parasitic-viruses"},{"title":"Patch","slug":"patch"}],"breadcrumb":{"location":"/dictionary/over-the-air-attack","crumbs":[{"pathname":"/","crumbLabel":"Homepage"},{"pathname":"/dictionary","crumbLabel":"dictionary"},{"pathname":"/dictionary/over-the-air-attack","crumbLabel":"over-the-air-attack"}]}}},"staticQueryHashes":["1614255152"]}