Wireless Application Protocol (WAP)

27th February 2020 | Cybrary Wireless Application Protocol (WAP)


A Wireless Application Protocol (WAP) is an old standard that allowed early mobile phones to access the Internet through something called a WAP Gateway. The WAP Gateway identified the device that was connecting to the Internet and could format the content sent to the device to match the screen size and type in use.  It was cumbersome, failed more often than it got the screen rendered correctly and is no longer in use. 

This standard was created by four companies: Ericsson, Motorola, Nokia, and Unwired Planet (now Phone.com). This protocol has become obsolete as newer Cell Phones can access the Internet no differently than your desktop or laptop computer.

Source: CNSSI 4009

Related Reading: Argus Cyber Security Targets IFEC Hackers With New Software

Does an SMB need to be concerned with WAP?

No. WAP is an outdated technology that was largely controlled by your mobile carrier.  Today, modern carriers are running on networks known as LTE and have launched their latest network interface to the Internet – something known as 5G. 5G promises lightning quick internet on par with the fastest broadband networks available today.

Learn more about the evolution of mobile network generations 1-5 watch this 6 min. video:

Are you doing enough to protect your business?

Sign up with CyberHoot today and sleep better knowing your

employees are cyber trained and on guard!


Sign Up Today!

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

184 Million Passwords Leaked: Is Your Digital Doppelgänger Out There?

184 Million Passwords Leaked: Is Your Digital Doppelgänger Out There?

Spoiler alert: If you’re still using “password123” or “iloveyou” for your login… it’s time for an...

Read more
CyberHoot Newsletter – June 2025

CyberHoot Newsletter – June 2025

CyberHoot June Newsletter: Stay Informed, Stay Secure Welcome to the June edition of CyberHoot’s newsletter,...

Read more
Make Phishing Training Count with HootPhish

Make Phishing Training Count with HootPhish

Stop tricking employees. Start training them. Take Control of Your Security Awareness Training with a Platform...

Read more