Dr. Daniel Soper provides an introduction to computer security in 12 lessons. Lesson 8 covers wireless security. Topics covered include wireless network concepts, wireless communication, the 802.11 protocol suite, wireless data frames, management frames, wireless network vulnerabilities, MAC spoofing, wired equivalent privacy (WEP), Wi-Fi protected access (WPA and WPA2), and methods of attacking wireless networks. You will need to skip ads to get to the content. Other lesson topics covered include dependence on technology, information assets, threats, vulnerabilities, controls, confidentiality, integrity, availability, types of attackers, methods of defense, and multi-layered security. Published in 2013.
Many computer viruses are spread via email, either as a file attachment or via a hyperlink within the email itself. For this reason, you should not open any attachment you are not expecting or click on any link you're not sure of.
If you receive an email attachment that you were not expecting, you should contact the sender to verify that they purposely sent you the attachment before you open it.
A number of the virus warnings circulating via email are hoaxes. Before forwarding any virus warning, always verify the information through a trusted anti-virus resource, such as the McAfee Threat Center, or an urban legends reference site, such as Snopes.com.