Wireless Application Protocol (WAP)

27th February 2020 | Cybrary Wireless Application Protocol (WAP)


A Wireless Application Protocol (WAP) is an old standard that allowed early mobile phones to access the Internet through something called a WAP Gateway. The WAP Gateway identified the device that was connecting to the Internet and could format the content sent to the device to match the screen size and type in use.  It was cumbersome, failed more often than it got the screen rendered correctly and is no longer in use. 

This standard was created by four companies: Ericsson, Motorola, Nokia, and Unwired Planet (now Phone.com). This protocol has become obsolete as newer Cell Phones can access the Internet no differently than your desktop or laptop computer.

Source: CNSSI 4009

Related Reading: Argus Cyber Security Targets IFEC Hackers With New Software

Does an SMB need to be concerned with WAP?

No. WAP is an outdated technology that was largely controlled by your mobile carrier.  Today, modern carriers are running on networks known as LTE and have launched their latest network interface to the Internet – something known as 5G. 5G promises lightning quick internet on par with the fastest broadband networks available today.

Learn more about the evolution of mobile network generations 1-5 watch this 6 min. video:

Are you doing enough to protect your business?

Sign up with CyberHoot today and sleep better knowing your

employees are cyber trained and on guard!


Sign Up Today!

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

Apple Alert: Critical AirPlay Vulnerabilities Expose Millions to Cyber Threats

Apple Alert: Critical AirPlay Vulnerabilities Expose Millions to Cyber Threats

A recent discovery by cybersecurity firm Oligo Security has unveiled a series of critical vulnerabilities in...

Read more
CyberHoot Newsletter – May 2025

CyberHoot Newsletter – May 2025

Welcome to CyberHoot's May Newsletter! This month, we're spotlighting key developments in the cyber threat...

Read more
Cybersecurity Advisory: Hackers Exploit Zoom’s Remote Control Feature

Cybersecurity Advisory: Hackers Exploit Zoom’s Remote Control Feature

A newly uncovered cyberattack campaign is exploiting Zoom’s Remote Control feature to infiltrate the systems...

Read more