Connecting to a bogus internet network could enable thieves to access email and social networking sites. Read More...