Fake wireless access pointsCookie theftFile name tricksLocation, location, locationHosts file redirectWaterhole attacksBait and switch