{"id":4402,"date":"2019-09-30T08:00:32","date_gmt":"2019-09-30T02:30:32","guid":{"rendered":"https:\/\/www.upnxtblog.com\/?p=4402"},"modified":"2019-09-26T12:22:12","modified_gmt":"2019-09-26T06:52:12","slug":"everything-you-need-to-know-about-the-threats-of-public-wifi","status":"publish","type":"post","link":"https:\/\/www.upnxtblog.com\/index.php\/2019\/09\/30\/everything-you-need-to-know-about-the-threats-of-public-wifi\/","title":{"rendered":"Everything You Need to Know About the Threats of Public WiFi"},"content":{"rendered":"<div class='booster-block booster-read-block'><\/div><div>We are all guilty of using public WiFi. Be it at our favorite coffee shop or a free hotspot we stumble upon while traveling. We see free WiFi, and we think \u201cJackpot!\u201d instead of considering the potential security threats.<\/div>\n<div><\/div>\n<div><span style=\"font-family: inherit; font-style: inherit; font-weight: inherit;\">But ignoring these threats doesn\u2019t make them scarce. One doesn\u2019t even need to be a professional hacker to take advantage of public WiFi vulnerabilities. Someone from the tech-savvy crowd can have bad intentions and take advantage of the WiFi network. Thus, it\u2019s essential to know about these threats and the ways to protect yourself from them.<\/span><\/div>\n<div>\n<p dir=\"ltr\"><\/p>\n<h2 dir=\"ltr\">Evil twin attacks<\/h2>\n<p dir=\"ltr\">Some places have a couple of public WiFi networks available. One shares the name of the place (e.g., Coffee-Shop), another one is for guests (e.g., Coffee-Shop-GUEST). Or one is password-protected while the other one offers free access.It seems innocent enough to connect to either of those networks. But there\u2019s no guarantee one of them is not fake.<\/p>\n<p dir=\"ltr\">A hacker can set up a separate WiFi connection with the same or similar name to the place where people tend to connect to WiFi, e.g., a coffee shop or mall. That gives them the power to see the exchanges of everyone connected to the network.<\/p>\n<p dir=\"ltr\">Of course, if two public WiFi networks have similar names, it doesn\u2019t mean a hacker runs one of them. But it\u2019s better to be safe than sorry and look for a secure connection instead.<\/p>\n<h2 dir=\"ltr\">Fake WiFi hotspots<\/h2>\n<p dir=\"ltr\">Fake or rogue WiFi hotspots share the same threats as evil twin attacks. But instead of mimicking some coffee shops or other places, they disguise as free public WiFi networks.<\/p>\n<p dir=\"ltr\">You encounter these networks everywhere. They go under the name Free WiFi, Free Access, or appear as random WiFi access points that are not password-protected. It may be a legit free connection offered by the city or some organization. But it can also be a network run by a hacker.<\/p>\n<h2 dir=\"ltr\">Lousy router configuration<\/h2>\n<p dir=\"ltr\">If you have ever had to set up a <a href=\"https:\/\/www.upnxtblog.com\/index.php\/2017\/10\/30\/5-best-android-apps-detect-wifi-network-intruders\/\">router<\/a> at your home, you know it requires logging in and configuring WiFi settings. Some people analyze the settings, secure the WiFi connection, and change the router password along the way. But most people don\u2019t.<\/p>\n<p dir=\"ltr\">WiFi works? That\u2019s good enough.<\/p>\n<p dir=\"ltr\">They leave the WiFi security settings untouched and often don\u2019t even try to change the router password. And that makes it easy for hackers to access the router. Then they can change the settings and overlook the internet traffic of those using the connection.<\/p>\n<h2 dir=\"ltr\">Man-in-the-middle attacks<\/h2>\n<p dir=\"ltr\">Another common threat when using public WiFi is man-in-the-middle attacks. They happen silently. You may not even realize something has happened. That\u2019s because the attacker \u201cstands\u201d between you and the website you access.<\/p>\n<p dir=\"ltr\">You may request a particular web page and get one with altered information. It may lead you to a fake login or payment page to steal your login credentials or bank account details. The same way, it can change your conversation online \u2014 alter your messages before sending or mess with the info you receive instead.<\/p>\n<h2 dir=\"ltr\">WiFi sniffing<\/h2>\n<p dir=\"ltr\">When you connect to a public WiFi, you get connected to a network. The other devices of that network won\u2019t be visible right away. But it only takes a piece of software for a hacker to oversee what\u2019s happening in the network. The websites you visit, the information you type &#8211; it\u2019s all available to the culprit.<\/p>\n<p dir=\"ltr\">Sure, there\u2019s no harm done if you use public WiFi only to scroll through meme sites. But it can cause a lot of damage if you decide to buy something online or check your bank account balance.<\/p>\n<p dir=\"ltr\">Checkout <a href=\"https:\/\/www.upnxtblog.com\/index.php\/2017\/10\/30\/5-best-android-apps-detect-wifi-network-intruders\/\">5 BEST Android apps to detect WiFi network intruders.<\/a><\/p>\n<h2 dir=\"ltr\">Worms<\/h2>\n<p dir=\"ltr\">Computer viruses are the most known threats online. But have you heard about computer worms?<\/p>\n<p dir=\"ltr\">A computer virus needs another program to spread from one device to another. Meanwhile, the worms can transport between devices on the same network without any help.<\/p>\n<p dir=\"ltr\">They damage the machine by multiplying and taking up extra memory or eating up the bandwidth. But more dangerous worms can also change files or lock some and demand a ransom.<\/p>\n<h2 dir=\"ltr\">What\u2019s the solution?<\/h2>\n<p dir=\"ltr\">One way to dodge these attacks is by avoiding public WiFi altogether. But let\u2019s be honest, it\u2019s difficult to deny yourself the convenience of a free hotspot.<\/p>\n<p dir=\"ltr\">Fortunately, there are other ways to fend off these threats.<\/p>\n<p>Equip yourself with an antivirus to keep those pesky worms at bay. And use a trustworthy VPN service to encrypt your connection to the internet at all times.<\/p>\n<p dir=\"ltr\">A VPN is a service that leads you to the websites you want to access through a secure tunnel. It encrypts your traffic &#8211; no one can check what you upload and download. Stumbled upon an evil twin or a fake WiFi hotspot? The hackers behind them won\u2019t be able to make sense of the information leaving (or coming to) your device. The same goes for the other threats on this list.<\/p>\n<p dir=\"ltr\">No matter what precautions you take, think twice before connecting to the first WiFi network you see. Avoid \u201cFree WiFi\u201d in the middle of nowhere. Found two identical WiFi networks? <strong>Go for the password-protected one rather than its FREE or GUEST copy.<\/strong><\/p>\n<h2>Useful Resources<\/h2>\n<ul>\n<li><a href=\"https:\/\/www.upnxtblog.com\/index.php\/2019\/09\/16\/why-is-nord-vpn-so-famous\/\">Why Is Nord VPN So Famous?<\/a><\/li>\n<li><a href=\"https:\/\/www.upnxtblog.com\/index.php\/2017\/08\/30\/9-best-chrome-extensions-privacy-internet-security-ad-blocking\/\">IT Fundamentals for Cybersecurity Specialization from IBM<\/a><\/li>\n<li><a href=\"https:\/\/www.upnxtblog.com\/index.php\/2017\/08\/30\/9-best-chrome-extensions-privacy-internet-security-ad-blocking\/\">9 Best Chrome Extensions for Privacy, Internet Security and Ad Blocking<\/a><\/li>\n<li><a href=\"https:\/\/www.upnxtblog.com\/index.php\/2018\/03\/29\/google-my-activity-tool\/\">Regain your privacy : Google My Activity Tool<\/a><\/li>\n<\/ul>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>We are all guilty of using public WiFi. Be it at our favorite coffee shop or a free hotspot we stumble upon while traveling. We see free WiFi, and we think \u201cJackpot!\u201d instead of considering the potential security threats. But ignoring these threats doesn\u2019t make them scarce. One doesn\u2019t even need to be a professional [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":2096,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"nf_dc_page":"","_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[314],"tags":[376,132],"class_list":["post-4402","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-privacy","tag-vpn","tag-wifi"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.upnxtblog.com\/wp-content\/uploads\/2018\/03\/wlan-3131127_1920.png?fit=1920%2C1280&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p9fbQS-190","jetpack-related-posts":[{"id":787,"url":"https:\/\/www.upnxtblog.com\/index.php\/2017\/10\/30\/5-best-android-apps-detect-wifi-network-intruders\/","url_meta":{"origin":4402,"position":0},"title":"5 BEST Android apps to detect WiFi network intruders","author":"Karthik","date":"October 30, 2017","format":false,"excerpt":"Do you want to know if someone is connected to your wireless network without your permission? Your connection is slow and you suspect that someone is stealing your WiFi? Are you afraid that the neighbor may have access to your personal data? below are the apps with which you can\u2026","rel":"","context":"In &quot;Best Apps&quot;","block_context":{"text":"Best Apps","link":"https:\/\/www.upnxtblog.com\/index.php\/category\/best-new-apps\/"},"img":{"alt_text":"backup","src":"https:\/\/i0.wp.com\/www.upnxtblog.com\/wp-content\/uploads\/2019\/03\/cloud-3998880_1920.jpg?fit=1200%2C648&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.upnxtblog.com\/wp-content\/uploads\/2019\/03\/cloud-3998880_1920.jpg?fit=1200%2C648&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.upnxtblog.com\/wp-content\/uploads\/2019\/03\/cloud-3998880_1920.jpg?fit=1200%2C648&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.upnxtblog.com\/wp-content\/uploads\/2019\/03\/cloud-3998880_1920.jpg?fit=1200%2C648&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.upnxtblog.com\/wp-content\/uploads\/2019\/03\/cloud-3998880_1920.jpg?fit=1200%2C648&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":4574,"url":"https:\/\/www.upnxtblog.com\/index.php\/2019\/11\/19\/fintechs-greatest-breakthrough-of-the-year-and-cybersecurity-threats-to-look-out-for\/","url_meta":{"origin":4402,"position":1},"title":"Fintech\u2019s greatest breakthrough of the year, and cybersecurity threats to look out for","author":"Karthik","date":"November 19, 2019","format":false,"excerpt":"This week's Guest post comes from\u00a0our friends at Chris Jones @ TurnOnVPN The Fintech industry is growing across the globe with many startups embracing it. Since 2015,numerous national fintech organizations have been advocating for activities for industry actors.They have managed to succeed in this by teaming up with investors, customers,\u2026","rel":"","context":"In &quot;Regain Your Privacy&quot;","block_context":{"text":"Regain Your Privacy","link":"https:\/\/www.upnxtblog.com\/index.php\/category\/privacy\/"},"img":{"alt_text":"Secure Connection","src":"https:\/\/i0.wp.com\/www.upnxtblog.com\/wp-content\/uploads\/2018\/03\/wlan-3131127_1920.png?fit=1200%2C800&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.upnxtblog.com\/wp-content\/uploads\/2018\/03\/wlan-3131127_1920.png?fit=1200%2C800&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.upnxtblog.com\/wp-content\/uploads\/2018\/03\/wlan-3131127_1920.png?fit=1200%2C800&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.upnxtblog.com\/wp-content\/uploads\/2018\/03\/wlan-3131127_1920.png?fit=1200%2C800&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.upnxtblog.com\/wp-content\/uploads\/2018\/03\/wlan-3131127_1920.png?fit=1200%2C800&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":569,"url":"https:\/\/www.upnxtblog.com\/index.php\/2017\/10\/05\/youre-looking-alternatives-traditional-routers-wifi-mesh-networks\/","url_meta":{"origin":4402,"position":2},"title":"If you&#8217;re looking for alternatives to traditional routers here it is WiFi Mesh Networks","author":"Karthik","date":"October 5, 2017","format":false,"excerpt":"Wi-Fi Mesh-networking kits uses multiple access points spread around your house\/small office and are a great alternative to traditional routers for large homes where a single powerful router can\u2019t make it. Traditional networks rely on a small number of wired access points or wireless hotspots to connect users. In a\u2026","rel":"","context":"In &quot;Trending&quot;","block_context":{"text":"Trending","link":"https:\/\/www.upnxtblog.com\/index.php\/category\/trending\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1201,"url":"https:\/\/www.upnxtblog.com\/index.php\/2017\/12\/01\/best-gaming-routers-2017\/","url_meta":{"origin":4402,"position":3},"title":"Best Routers For Gaming","author":"Karthik","date":"December 1, 2017","format":false,"excerpt":"Whether you\u2019re a hardcore or casual gamer, you are aware that your in-game performance relies on your internet connection. In this post, we are going to look for the best router for gaming and we\u2019ve come up with 6 different options for various budgets. Although a hardwired Ethernet connection is\u2026","rel":"","context":"In &quot;Trending&quot;","block_context":{"text":"Trending","link":"https:\/\/www.upnxtblog.com\/index.php\/category\/trending\/"},"img":{"alt_text":"controller","src":"https:\/\/i0.wp.com\/www.upnxtblog.com\/wp-content\/uploads\/2017\/11\/controller-2923485_1280.png?fit=1200%2C782&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.upnxtblog.com\/wp-content\/uploads\/2017\/11\/controller-2923485_1280.png?fit=1200%2C782&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.upnxtblog.com\/wp-content\/uploads\/2017\/11\/controller-2923485_1280.png?fit=1200%2C782&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.upnxtblog.com\/wp-content\/uploads\/2017\/11\/controller-2923485_1280.png?fit=1200%2C782&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.upnxtblog.com\/wp-content\/uploads\/2017\/11\/controller-2923485_1280.png?fit=1200%2C782&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":7530,"url":"https:\/\/www.upnxtblog.com\/index.php\/2023\/11\/13\/is-vpn-still-a-good-way-of-protecting-my-business-against-cyber-attacks\/","url_meta":{"origin":4402,"position":4},"title":"Is VPN still a good way of protecting my business against Cyber Attacks?","author":"Karthik","date":"November 13, 2023","format":false,"excerpt":"Using a Virtual Private Network (VPN) has long been a popular way for businesses to secure their data and connections against cyber threats. But with the ever-evolving landscape of cybercrime, is VPN technology still an effective cybersecurity solution for companies in 2023? The ongoing threat of cyber attacks Cyber attacks\u2026","rel":"","context":"In &quot;Best Tools\/Open Source Libs&quot;","block_context":{"text":"Best Tools\/Open Source Libs","link":"https:\/\/www.upnxtblog.com\/index.php\/category\/new-tools\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.upnxtblog.com\/wp-content\/uploads\/2023\/11\/map-4636843_1280.jpg?fit=1200%2C768&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.upnxtblog.com\/wp-content\/uploads\/2023\/11\/map-4636843_1280.jpg?fit=1200%2C768&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.upnxtblog.com\/wp-content\/uploads\/2023\/11\/map-4636843_1280.jpg?fit=1200%2C768&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.upnxtblog.com\/wp-content\/uploads\/2023\/11\/map-4636843_1280.jpg?fit=1200%2C768&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.upnxtblog.com\/wp-content\/uploads\/2023\/11\/map-4636843_1280.jpg?fit=1200%2C768&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":2094,"url":"https:\/\/www.upnxtblog.com\/index.php\/2018\/03\/09\/wpa3-new-wi-fi-security-standard-with-more-security-features\/","url_meta":{"origin":4402,"position":5},"title":"WPA3 is new Wi-Fi security standard with more security features","author":"Karthik","date":"March 9, 2018","format":false,"excerpt":"The Wi-Fi Alliance has recently announced\u00a0WPA3, a Wi-Fi security standard that will replace WPA2.WPA stands for Wi-Fi Protected Access.Currently\u00a0WPA2 is a security standard that defines what happens when you connect to a closed Wi-Fi network using a password. WPA2 defines the protocol a router and Wi-Fi client devices use to\u2026","rel":"","context":"In &quot;Trending&quot;","block_context":{"text":"Trending","link":"https:\/\/www.upnxtblog.com\/index.php\/category\/trending\/"},"img":{"alt_text":"Secure Connection","src":"https:\/\/i0.wp.com\/www.upnxtblog.com\/wp-content\/uploads\/2018\/03\/wlan-3131127_1920.png?fit=1200%2C800&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.upnxtblog.com\/wp-content\/uploads\/2018\/03\/wlan-3131127_1920.png?fit=1200%2C800&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.upnxtblog.com\/wp-content\/uploads\/2018\/03\/wlan-3131127_1920.png?fit=1200%2C800&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.upnxtblog.com\/wp-content\/uploads\/2018\/03\/wlan-3131127_1920.png?fit=1200%2C800&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.upnxtblog.com\/wp-content\/uploads\/2018\/03\/wlan-3131127_1920.png?fit=1200%2C800&ssl=1&resize=1050%2C600 3x"},"classes":[]}],"jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/www.upnxtblog.com\/index.php\/wp-json\/wp\/v2\/posts\/4402","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.upnxtblog.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.upnxtblog.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.upnxtblog.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.upnxtblog.com\/index.php\/wp-json\/wp\/v2\/comments?post=4402"}],"version-history":[{"count":6,"href":"https:\/\/www.upnxtblog.com\/index.php\/wp-json\/wp\/v2\/posts\/4402\/revisions"}],"predecessor-version":[{"id":4410,"href":"https:\/\/www.upnxtblog.com\/index.php\/wp-json\/wp\/v2\/posts\/4402\/revisions\/4410"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.upnxtblog.com\/index.php\/wp-json\/wp\/v2\/media\/2096"}],"wp:attachment":[{"href":"https:\/\/www.upnxtblog.com\/index.php\/wp-json\/wp\/v2\/media?parent=4402"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.upnxtblog.com\/index.php\/wp-json\/wp\/v2\/categories?post=4402"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.upnxtblog.com\/index.php\/wp-json\/wp\/v2\/tags?post=4402"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}