This report summarizes research analyzing vulnerabilities when users connect to unsecured public Wi-Fi networks. The researchers collected data by creating their own rogue access points and monitoring existing public networks. They found over 2500 domains visited by 270 users, with many sites only using HTTPS for login leaving other traffic unencrypted. Successful attacks like traffic monitoring, HTTP request/response modification, and session hijacking were possible. A survey found most users aware of risks but not taking precautions. The researchers conclude that while encryption can help, users also need to be cautious on unsecured networks.