Hacker used this function as a attacking method, as they send you requests to accept their networks as your Wi-Fi connections. These requests can be like “Hey it’s me your office access point connect here” or “This is your home network connect this”.
Normal users, like many of us, will connect these networks, but doing so will you get to bunch or attacks on your machine, as your operating system or application gives hackers unauthorized access to your system.
You cant skip these hacking requests, as they are carried away automatically. So you cant stop this but there are some ways to do some tweaking to keep such attacks busy for sometime and to put more effect to get them access to your system.