[Home]  [Headlines]  [Latest Articles]  [Latest Comments]  [Post]  [Sign-in]  [Mail]  [Setup]  [Help]  [Register] 

Status: Not Logged In; Sign In

Possible Trump Rally Attack - Serious Injuries Reported

BULLETIN: ISRAEL IS ENTERING **** UKRAINE **** WAR ! Missile Defenses in Kiev !

ATF TO USE 2ND TRUMP ATTACK TO JUSTIFY NEW GUN CONTROL...

An EMP Attack on the U.S. Power Grids and Critical National Infrastructure

New York Residents Beg Trump to Come Back, Solve Out-of-Control Illegal Immigration

Chicago Teachers Confess They Were told to Give Illegals Passing Grades

Am I Racist? Reviewed by a BLACK MAN

Ukraine and Israel Following the Same Playbook, But Uncle Sam Doesn't Want to Play

"The Diddy indictment is PROTECTING the highest people in power" Ian Carroll

The White House just held its first cabinet meeting in almost a year. Guess who was running it.

The Democrats' War On America, Part One: What "Saving Our Democracy" Really Means

New York's MTA Proposes $65.4 Billion In Upgrades With Cash It Doesn't Have

More than 100 killed or missing as Sinaloa Cartel war rages in Mexico

New York state reports 1st human case of EEE in nearly a decade

Oktoberfest tightens security after a deadly knife attack in western Germany

Wild Walrus Just Wanted to Take A Summer Vacation Across Europe

[Video] 'Days of democracy are GONE' seethes Neil Oliver as 'JAIL' awaits Brits DARING to speak up

Police robot dodges a bullet, teargasses a man, and pins him to the ground during a standoff in Texas

Julian Assange EXPOSED

Howling mad! Fury as school allows pupil suffering from 'species dysphoria' to identify as a WOLF

"I Thank God": Heroic Woman Saves Arkansas Trooper From Attack By Drunk Illegal Alien

Taxpayers Left In The Dust On Policy For Trans Inmates In Minnesota

Progressive Policy Backfire Turns Liberals Into Gun Owners

PURE EVIL: Israel booby-trapped CHILDRENS TOYS with explosives to kill Lebanese children

These Are The World's Most Reliable Car Brands

Swing State Renters Earn 17% Less Than Needed To Afford A Typical Apartment

Fort Wayne man faces charges for keeping over 10 lbs of fentanyl in Airbnb

🚨 Secret Service Announces EMERGENCY LIVE Trump Assassination Press Conference | LIVE Right Now [Livestream in progress]

More Political Perverts, Kamala's Cringe-fest On Oprah, And A Great Moment For Trump

It's really amazing! Planet chocolate cake eaten by hitting it with a hammer [Slow news day]


Science/Tech
See other Science/Tech Articles

Title: Why Public WiFi Hotspots Are Trouble Spots for Users
Source: From The Trenches
URL Source: http://www.fromthetrenchesworldrepo ... trouble-spots-for-users/37449/
Published: Mar 11, 2013
Author: Angel - NYC
Post Date: 2013-03-11 14:51:10 by Original_Intent
Keywords: security, hackers, phishers, scum
Views: 245
Comments: 12

Why Public WiFi Hotspots Are Trouble Spots for Users

Posted on by Angel - NYC

AOL – by Private WiFi

Take a look around any coffee shop, airport, hotel or library, and you’ll quickly notice that Public WiFi hotpots have become the rule, not the exception. See all those people tapping away on their smart phone, tablet or laptop in a one-man/woman quest to check their email, pay their bills, tweet, update their status and so on? They’re your proof. In 2011, the number of WiFi hotspots reached 1.3 million worldwide. By 2015, WiFi users will be able to connect to 5.8 million hotspots, according to a report commissioned by the Wireless Broadband Alliance.

The fact is, if you use a laptop or any kind of WiFi-enabled mobile device away from home, it’s next to impossible to pass up the ease and convenience of connecting to a Public WiFi network every now and again. Unfortunately, not all hotspots are safe for you to do so. As the number of hotspots grows exponentially, so do the security risks for their users. The reason is simple: Because WiFi signals are radio waves, anyone within range of a public WiFi network can listen in on what users are sending and receiving. Unlike home WiFi networks, the vast majority of public WiFi hotspots don’t encrypt the data being transmitted through them. Therefore, when you connect to a hotspot, everything from your email and your bank account and credit card information to your social media content may be fair game for hackers. The 2013 Identity Fraud Report released by Javelin Strategy & Research found that the number of identity fraud victims increased to 12.6 million consumers last year – hitting more than one out of every 20 U.S. consumers. According to the report, smartphone and tablet users were constant targets of cyber criminals using malware and phishing exploits and compromising unsecured WiFi connections to steal users’ sensitive information.

How Hotspot Hackers Steal Your Identity and Your Credit 

Sniffer software. Allows a hacker to monitor the traffic traveling to and from a computer that’s connected to a public network. This is the most basic kind of attack and can eavesdrop on emails and chats, capturing log-ins and personal or financial information. A hotspot user will never suspect their information has been compromised.

Address Resolution Protocolor ARP Spoofing. This method redirects the network traffic to the hacker, modifying it or blocking it altogether without being detected. ARP spoofing is often used to open the door for other kinds of attacks such as sidejacking.

Sidejackingor session hijacking.This happens when a hacker sniffs a hotspot user’s Web session. That information is used it to clone the user’s account, allowing the hacker to do anything the user can do while logged into a website. Sidejacking typically happens when users type in their user names and passwords when connecting to a website not properly protected by https

Evil Twinor WiPhishing. Evil Twins are designed to look like real hotspots. But when users log in to them, they unknowingly expose their passwords and other sensitive information to hackers. Evil Twins can be launched from laptop at a hotspot or from as far as 300 feet away. Warnings signs that hotspot users should watch for are unusual variations in the lettering, logo or wording of legitimate hotspots. Once an Evil Twin gains access to your computer, it can launch a

Man-in-the-Middle Attack which allows it to eavesdrop on Internet traffic and capture passwords and account and payment information. More sophisticated Evil Twins can even control which websites appear.

Ad hoc or peer-to-peer network. Another sign you could be in for trouble: Two little computer symbols that appear when you’re trying to connect to a wireless network. That means you’re connecting to someone else’s laptop – an ad hoc or peer-to-peer network, not a WiFi hotspot. Once you connect to a viral network like that, your shared files can be accessed by every other laptop connected to the network.

Rogue ad hoc networks. With names like “Free Public WiFi,” these networks can turn up wherever there are public WiFi hotspots and can be used to trick unsuspecting WiFi users into connecting to them. Not all ad hoc networks are created by hackers. But it’s impossible to distinguish the real ones from the fakes. So to be safe, you should steer clear of them all.
WiFi users whose laptops were hacked at airport, hotel and coffee house hotspots have filed complaints with the Federal Trade Commission and the Better Business Bureau. Here’s what you can do to protect your sensitive information at WiFi hotspots:

Don’t Get Hacked at a Hotspot

The Only Way to Be Safer Is to Be Invisible at WiFi Hotspots

But it’s important to remember that an encrypted website only protects the information sent to and from that site, not all the information you send over a public wireless network. The best way to protect all your information from hotspot hackers, every time you connect, is to use a Virtual Private Network. VPNs encrypt all the data travelling to and from your laptop and other mobile devices by sending it through a secure tunnel that’s invisible to hackers. That’s why the Federal Trade Commission recommends using a VPN when you connect to public WiFi networks in their article Tips for Using Public Wi-Fi Networks.

Unfortunately, survey after survey shows that most WiFi users aren’t protecting their information at public hotspots. A 2012 survey conducted by the Identity Theft Resource Center with PRIVATE WiFi found that 24% of respondents said they made purchases in a public hotspot while 57% admitted to accessing confidential work-related information. Yet only 27% of those polled said they used a VPN to protect their data. And 44% said they weren’t even aware that there was a way to protect their sensitive information when using a public hotspot.

Remember, WiFi hotspots are public wireless networks. Whether they’re free or paid hotspots, that means there’s no privacy. Anyone can join and listen in to what’s going on. That makes you totally responsible for protecting your wireless security. The 2013 Javelin Identity Fraud Report found that tablet users were 80% more likely than other consumers to be victims of ID fraud. Every time you use a hotspot for online banking or shopping or checking your email, a hacker could be sitting right next to you drinking a cup of coffee. Or he could be waiting to catch the same plane as you at the airport. Or staying in a hotel room down the hall. And you’ll never know he’s stealing your confidential information – until it’s too late.

Free WiFi hotspots are a great resource for work and for play. But if you don’t protect your personal information when you’re using them, they could end up costing you a bundle. Every three seconds, someone in the U.S. becomes a victim of identity fraud. So the next time you’re about to use a WiFi hotspot, you may want to take the necessary precautions before you connect.

http://blog.lifestore.aol.com/2013/03/10/public-wifi-hotspot-security/

(1 image)

Post Comment   Private Reply   Ignore Thread  


TopPage UpFull ThreadPage DownBottom/Latest

#1. To: Original_Intent (#0)

Excellent thread. I use McAfee Total Protection including the firewall when I stay at hotels and coffee shops and when I'm absent from the hotel, I always unplug my computer and store it away locked up.

purplerose  posted on  2013-03-11   15:25:09 ET  Reply   Trace   Private Reply  


#2. To: purplerose (#1)

I am much the same way. I keep my firewall up, protected from malicious downloads, and disconnect from wi-fi when I am not actually using it. I also have 3rd party software that checks for malware etc., ...

Perseverent Gardener
"“Believe nothing merely because you have been told it. Do not believe what your teacher tells you merely out of respect for the teacher. But whatsoever, after due examination and analysis, you find to be kind, conducive to the good, the benefit, the welfare of all beings - that doctrine believe and cling to, and take it as your guide.” ~ Gautama Siddhartha — The Buddha

Original_Intent  posted on  2013-03-11   15:35:03 ET  Reply   Trace   Private Reply  


#3. To: Original_Intent, purplerose, 4 (#0)

After my last gmail hack, I am trying LastPass.com to get serious with passwords.

I'm also using Microsoft's new cloud-based email outlook.com as my client. So far (after three weeks), I like it a lot.

“The most dangerous man to any government is the man who is able to think things out... without regard to the prevailing superstitions and taboos. Almost inevitably he comes to the conclusion that the government he lives under is dishonest, insane, intolerable.” ~ H. L. Mencken

Lod  posted on  2013-03-11   16:49:25 ET  Reply   Trace   Private Reply  


#4. To: Original_Intent (#0)

Just to play devils advocate, wouldn't a hotel already have your credit card info? Or at least one CC. I've never stayed at one that took cash for more than an hour.

j/k on the last part.

"I am not one of those weak-spirited, sappy Americans who want to be liked by all the people around them. I don’t care if people hate my guts; I assume most of them do. The important question is whether they are in a position to do anything about it." - William S Burroughs

Dakmar  posted on  2013-03-11   17:18:31 ET  Reply   Trace   Private Reply  


#5. To: Lod, purplerose, 4 (#3)

I don't trust anything "cloud" based. Too easy for official snoops to gain access.

Perseverent Gardener
"“Believe nothing merely because you have been told it. Do not believe what your teacher tells you merely out of respect for the teacher. But whatsoever, after due examination and analysis, you find to be kind, conducive to the good, the benefit, the welfare of all beings - that doctrine believe and cling to, and take it as your guide.” ~ Gautama Siddhartha — The Buddha

Original_Intent  posted on  2013-03-11   17:58:15 ET  Reply   Trace   Private Reply  


#6. To: Original_Intent (#5)

Agree completely.

Until Kim Dotcom gets his Mega thing up and running again, we should all expect that everything that we post is tracked/traced.

Total encryption! rules.

“The most dangerous man to any government is the man who is able to think things out... without regard to the prevailing superstitions and taboos. Almost inevitably he comes to the conclusion that the government he lives under is dishonest, insane, intolerable.” ~ H. L. Mencken

Lod  posted on  2013-03-11   18:03:38 ET  Reply   Trace   Private Reply  


#7. To: Lod (#6)

Mega is up and running again and has been for some time.

MEGA

Americans who have no experience with, or knowledge of, tyranny believe that only terrorists will experience the unchecked power of the state. They will believe this until it happens to them, or their children, or their friends.

Paul Craig Roberts

James Deffenbach  posted on  2013-03-11   23:22:43 ET  Reply   Trace   Private Reply  


#8. To: Lod (#3)

I never memerize passwords and use a different one at every site. All you need is an encrypted text file with all your user names and passwords in it for different sites. Heck my user names are even harder to guess than my passwords, which gives you double the security.

God is always good!

RickyJ  posted on  2013-03-12   0:04:38 ET  Reply   Trace   Private Reply  


#9. To: RickyJ (#8)

Heck my user names are even harder to guess than my password...

RickyJay?

Fred Mertz  posted on  2013-03-12   6:22:18 ET  Reply   Trace   Private Reply  


#10. To: Fred Mertz (#9)

RickyJay?

Funny!

No, I mean they are really like random passwords, and not really a name at all. I don't use real names anywhere except on forums where I don't care if someone hacks me.

God is always good!

RickyJ  posted on  2013-03-12   20:30:13 ET  Reply   Trace   Private Reply  


#11. To: James Deffenbach (#7)

Mega thanks.

“The most dangerous man to any government is the man who is able to think things out... without regard to the prevailing superstitions and taboos. Almost inevitably he comes to the conclusion that the government he lives under is dishonest, insane, intolerable.” ~ H. L. Mencken

Lod  posted on  2013-03-12   22:10:47 ET  Reply   Trace   Private Reply  


#12. To: Lod (#11)

You're welcome, Lod. It is a handy site to upload stuff that is important to you in case of a computer crash or a "messy uppy" in partitioning a hard drive. Not that I would ever make any of those of course....>(;^{]

Americans who have no experience with, or knowledge of, tyranny believe that only terrorists will experience the unchecked power of the state. They will believe this until it happens to them, or their children, or their friends.

Paul Craig Roberts

James Deffenbach  posted on  2013-03-12   22:20:26 ET  Reply   Trace   Private Reply  


TopPage UpFull ThreadPage DownBottom/Latest


[Home]  [Headlines]  [Latest Articles]  [Latest Comments]  [Post]  [Sign-in]  [Mail]  [Setup]  [Help]  [Register]