How To Protect Wireless Communications From Malicious Interference