{"id":31475,"date":"2013-09-04T05:35:17","date_gmt":"2013-09-04T10:35:17","guid":{"rendered":"http:\/\/www.ict-pulse.com\/?p=31475"},"modified":"2013-09-04T05:39:27","modified_gmt":"2013-09-04T10:39:27","slug":"wireless-hotspots-convenience-curse","status":"publish","type":"post","link":"https:\/\/ict-pulse.com\/2013\/09\/wireless-hotspots-convenience-curse\/","title":{"rendered":"Wireless hotspots \u2013 convenience or curse?"},"content":{"rendered":"
Wireless hotspots are incredibly convenient, but they are also terribly insecure. Understand the risks and learn how you can protect yourself.<\/em><\/p>\n <\/p>\n Wireless Hotspots \u2013 those places that offers wireless Internet access to the visitor or weary traveller. They are often found in coffee shops, bistros, restaurants, and well, almost anywhere. Some of those hotspots, you either have to pay to use, or patronise the establishment, but many are also free.<\/p>\n Hotspots are convenient: a way to get connected, when you aren’t already always connected. It offers a quick respite from the Facebook or Twitter cravings, and can be a life-saver when you need to send an email to your boss. It is also nice to have when you’re working from “home” but actually on the beach (hey, as long as the work is done!).<\/p>\n Many people can be seen pecking away at laptops, or have their faces buried in their tablets or mobile smartphones while connected to these hotspots. But, are wireless hotspots safe?<\/p>\n The simple answer is no. Wireless hotspots are not safe.<\/p>\n Don’t get me wrong, I’m not saying to not use hotspots; besides, I use them all the time. Hotspots are like public pools \u2013 it’s okay to have fun in it, just don’t drink the water. That is, take some time to understand the risks, and make some effort to protect yourself.<\/p>\n Most hotspots are open, that is, they are unprotected and unencrypted, and anyone can access them. Even hotspots that either require an access-code or username\/password are open, but just have a gateway device in-between the wireless network and the Internet to regulate access. All the traffic between your device and the access-point (the wireless transmitter\/receiver) is unencrypted. This means that anyone within the vicinity can “see” your traffic, and someone with some know-how can read it.<\/p>\n Another risk that’s gaining popularity is the Man-in-the-Middle attack (MITM). The attacker uses a device that presents itself as a wireless hotspot, but in reality, is an access-point engineered to capture all traffic that passes through it. MITM attacks have been around for years, but because of the power of mobile chips, those devices have become smaller and more portable. An attacker can leave the device hidden at a location and then return later to collect it with all the data stored on it.<\/p>\n What’s more with the MITM attack is that the attacker has full control over the network, unlike the hotspot at a coffee shop. This means, he or she, can direct you anywhere they want. They can issue fake websites, or route you to infected ones, where they can phish your personal details or infect your computer. For example, when you type ‘google.com’ or ‘yourbank.com’, you can be sent to a website that looks like the real Google.com (or yourbank.com), but is really a fake site set up to look like it.<\/p>\n Wireless hotspots have allowed us to stay connected and get more done, and with some precautions you can use it safely. However, in a world where it is now easy to become engrossed in your virtual life, perhaps it might be nice to disconnect from the electronic devices and connect to the people around you instead.<\/p>\n Stay safe out there.<\/p>\n <\/p>\nSo what are the risks?<\/h3>\n
So, knowing some of these risks, how can I protect myself?<\/h3>\n
\n
In conclusion<\/h3>\n