http://www.e4engineering.com/story.a...d-a7bd9b6a4258

Anyone read anything more interesting about "Evil Twins"? This is the first time I've heard of em, and they sound pretty interesting and definitly a security hazard. What could be done to thwart this sort of attack from your users? I mean, if someone sets up an evil twin, installs something on half of your users laptops, what do you do and how can you prevent it?