visit
Table of Contents:
Man-in-the-Middle Attacks
One of the most common threats with using public wifi is the risk of a MiTM attack. Essentially, what happens is that the attacker sits in between two devices that are communicating with one another. On a public network, this makes it even easier for attackers to perform a MiTM attack as there is less security covered on the network. Here’s an example. Alice (point A) sends an email to Bob (point B), vulnerabilities may exist that allow an attacker to sit in between the two and read the messages being sent to one another. So, what you thought was a private email exchange between Alice and Bob is no longer private.Snooping and Sniffing
Attackers can purchase special kits and devices to help them eavesdrop on Wi-Fi signals. This technique would “allow an attacker to access everything that you are doing online - from viewing whole webpages you have visited to being able to capture your login credentials” (). Take note that you won’t know when an attacker is snooping and sniffing your activity. It will occur in the background, and again since you are connected to the public wifi, you are more vulnerable to snooping and sniffing.Malicious Hotspots
Cybercriminals will typically trick victims into “connecting to what they think is a legitimate network because the name sounds reputable” (). Let’s take a look at an example for a better understanding. For example, let’s say that you are staying at Hyatt Hotel and you want to connect to the hotel’s WiFi. The hotel’s network name is “HyattWifi”, however instead you connected to the network “Hyattwifi”. Did you notice the difference? There is a minimal change in the network name making it difficult for people to notice the difference. My suggestion is to always ask the front desk what the hotel WiFi is as some hotels may provide you with a login and password in order to connect to their network. This is the perfect example in my opinion as to why it is not safe to connect to public WiFi.Malware Distribution
Hackers can use unencrypted and unsecured networks to distribute malware. They can also exploit weaknesses in vulnerable softwares to inject malware into your device. This can be done by writing code to target a specific vulnerability within a software. Another way for hackers to install malware onto your system is by “causing a pop-up window to appear during the connection process offering an upgrade to a piece of popular software” (). If you click on the window then it will automatically start downloading the malware onto your system.Use VPN
Using a VPN will establish a secure and encrypted connection to provide privacy while you are browsing the Internet. Even if a hacker “manages to position himself in the middle of your connection, the data here will be strongly encrypted” (). Therefore, the information that the hackers retrieve would only be useful to them if they were to decrypt the data. In most cases, the target wants to go for an easy target and not go through the hassle of decrypting the encrypted information.
Disable File Sharing
When connected to the Internet via a public network, I recommend you turn off file sharing on your device.Use SSL Connections
Remember to “enable the “Always Use HTTPS” option on all websites that you visit frequently, or that require you to enter some kind of credentials” ().Turn Off your WiFi When you Don’t Need It
Believe it or not, even if you aren’t actively connected to a network, the “Wi-Fi hardware in your computer is still transmitting data between any network within range” (). So, if you are only using a Word document and don’t need access to the Internet, then turn off your WiFi.