{"id":31475,"date":"2013-09-04T05:35:17","date_gmt":"2013-09-04T10:35:17","guid":{"rendered":"http:\/\/www.ict-pulse.com\/?p=31475"},"modified":"2013-09-04T05:39:27","modified_gmt":"2013-09-04T10:39:27","slug":"wireless-hotspots-convenience-curse","status":"publish","type":"post","link":"https:\/\/ict-pulse.com\/2013\/09\/wireless-hotspots-convenience-curse\/","title":{"rendered":"Wireless hotspots \u2013 convenience or curse?"},"content":{"rendered":"

Wireless hotspots are incredibly convenient, but they are also terribly insecure. Understand the risks and learn how you can protect yourself.<\/em><\/p>\n

\"Wi-fi<\/p>\n

Wireless Hotspots \u2013 those places that offers wireless Internet access to the visitor or weary traveller. They are often found in coffee shops, bistros, restaurants, and well, almost anywhere. Some of those hotspots, you either have to pay to use, or patronise the establishment, but many are also free.<\/p>\n

Hotspots are convenient: a way to get connected, when you aren’t already always connected. It offers a quick respite from the Facebook or Twitter cravings, and can be a life-saver when you need to send an email to your boss. It is also nice to have when you’re working from “home” but actually on the beach (hey, as long as the work is done!).<\/p>\n

Many people can be seen pecking away at laptops, or have their faces buried in their tablets or mobile smartphones while connected to these hotspots. But, are wireless hotspots safe?<\/p>\n

The simple answer is no. Wireless hotspots are not safe.<\/p>\n

Don’t get me wrong, I’m not saying to not use hotspots; besides, I use them all the time. Hotspots are like public pools \u2013 it’s okay to have fun in it, just don’t drink the water. That is, take some time to understand the risks, and make some effort to protect yourself.<\/p>\n

So what are the risks?<\/h3>\n

Most hotspots are open, that is, they are unprotected and unencrypted, and anyone can access them. Even hotspots that either require an access-code or username\/password are open, but just have a gateway device in-between the wireless network and the Internet to regulate access. All the traffic between your device and the access-point (the wireless transmitter\/receiver) is unencrypted. This means that anyone within the vicinity can “see” your traffic, and someone with some know-how can read it.<\/p>\n

Another risk that’s gaining popularity is the Man-in-the-Middle attack (MITM). The attacker uses a device that presents itself as a wireless hotspot, but in reality, is an access-point engineered to capture all traffic that passes through it. MITM attacks have been around for years, but because of the power of mobile chips, those devices have become smaller and more portable. An attacker can leave the device hidden at a location and then return later to collect it with all the data stored on it.<\/p>\n

What’s more with the MITM attack is that the attacker has full control over the network, unlike the hotspot at a coffee shop. This means, he or she, can direct you anywhere they want. They can issue fake websites, or route you to infected ones, where they can phish your personal details or infect your computer. For example, when you type ‘google.com’ or ‘yourbank.com’, you can be sent to a website that looks like the real Google.com (or yourbank.com), but is really a fake site set up to look like it.<\/p>\n

So, knowing some of these risks, how can I protect myself?<\/h3>\n
    \n
  1. Use hotspots only when necessary. The less you use it, the less risky it becomes.<\/li>\n
  2. Don’t make assumptions about the availability of a hotspot at a site. Ask the store workers whether they indeed have a hotspot and what is the name. If you see more than one, ask if they do have more than one access-points (sometimes they do if the site is big); of the answer is no, do not connect.<\/li>\n
  3. Only visit secured sites, that is, sites that start with HTTPS. If your browser gives any warnings about the site certificate such as a name mismatch, or certificate expiration, disconnect immediately.<\/li>\n
  4. Avoid using native apps on phones or tablets, unless you are positive that the apps encrypt all their communications. Some apps do not encrypt all the data transmissions and can therefore be seen by third parties.<\/li>\n
  5. Use a VPN (Virtual Private Network). VPNs usually encrypt data so that they are securely transmitted, and safe from prying eyes. Your company may have VPN services, so ask your IT department about it. If you have a company that does not already have VPN services, then consider implementing it. You can also consider \u00a0trusted 3rd party VPN providers<\/a>. These are usually paid services, but can be worth the investment to protect your data.<\/li>\n
  6. Use a personal firewall and an updated anti-virus software. This will help protect your device from unauthorised access and drive-by infections. Drive-by infections are where your computer can be compromised by simply visiting a malicious or infected site.<\/li>\n
  7. Configure your computer, tablet or phone to not automatically connect to an open network. Also, when you are done using a hotspot, delete the profile from your device to prevent it from remembering the connection and automatically connecting the next time.<\/li>\n
  8. And lastly, know that not all risks are high tech. That guy sitting next to you may be more than just a customer, and may be looking at everything that you are doing. Be aware of those around you and install a privacy screen on your laptops and tablets. Don’t forget those CCTV cameras as well; you never know who’s watching.<\/li>\n<\/ol>\n

    In conclusion<\/h3>\n

    Wireless hotspots have allowed us to stay connected and get more done, and with some precautions you can use it safely. However, in a world where it is now easy to become engrossed in your virtual life, perhaps it might be nice to disconnect from the electronic devices and connect to the people around you instead.<\/p>\n

    Stay safe out there.<\/p>\n

     <\/p>\n

    Image credit:\u00a0 Salvatore Vuono (FreeDigitalPhotos.net<\/a>)<\/em><\/p>\n

    _________________<\/p>\n","protected":false},"excerpt":{"rendered":"

    Wireless hotspots are incredibly convenient, but they are also terribly insecure. Understand the risks and learn how you can protect yourself. Wireless Hotspots \u2013 those places that offers wireless Internet […]<\/p>\n","protected":false},"author":3,"featured_media":31521,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","om_disable_all_campaigns":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false},"version":2}},"categories":[11,6,33,28],"tags":[105,38,35,34,41,37,68,66,240],"class_list":["post-31475","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ict-tech","category-internet","category-lists","category-networking","tag-cybercrimecybersecurity","tag-data-protection","tag-it","tag-lists-2","tag-privacy","tag-smartphones","tag-tablets","tag-wi-fi","tag-wireless","et-has-post-format-content","et_post_format-et-post-format-standard"],"jetpack_publicize_connections":[],"aioseo_notices":[],"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"https:\/\/i0.wp.com\/ict-pulse.com\/wp-content\/uploads\/2013\/09\/Wi-fi-Zone-by-Salvatore-Vuono-FreeDigitalPhotos.net_.jpg?fit=400%2C400&ssl=1","jetpack_shortlink":"https:\/\/wp.me\/p2iE1G-8bF","jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/posts\/31475","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/comments?post=31475"}],"version-history":[{"count":10,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/posts\/31475\/revisions"}],"predecessor-version":[{"id":31555,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/posts\/31475\/revisions\/31555"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/media\/31521"}],"wp:attachment":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/media?parent=31475"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/categories?post=31475"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/tags?post=31475"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}