Someone turns their computer into a network access point, and gives is a real-enough sounding name (often imitating popular, well-known ones like “T-Mobile” for instance). When you connect, you’re actually connecting through their computer. And they now will gain access to all of the information you used to login, as well as your browsing activity.