wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Dangers of Using Public WiFis

profile
Aston Dsouza
Aug 18, 2022
2 Likes
0 Discussions
163 Reads

Public Wi-Fi, whether at a public library, coffee shop, railway station, or retail store, makes it simple to connect to the internet from any location. It allows you to send emails, access your bank accounts, and read news items. Should you, however?

Public Wi-Fi, while handy and attractive for users, raises security and privacy problems. For example, free Wi-Fi hotspots do not require authentication to create a network connection, making it easier for hackers to get access to unprotected network equipment. So, what are the most dangerous threats you face while connecting to public Wi-Fi networks?

Packet sniffing or eavesdropping 

Packet sniffing or eavesdropping is the illegal monitoring of data transmitted between devices. Internet users without Wi-Fi hotspot protection risk not only losing critical information but also having their information modified. One doesn’t have to be a master codebreaker to steal personal data on public Wi-Fi. Just having the right gear and  special tools for sniffing is enough.Wire shark is one such tool which can spy on open unsecure packets to get information such as passwords ,usernames and more.

Malware infection  

When you use public WiFi,you open yourself up to browser hijackers, who send malware to innocent web users. You may be opening a news website and suddenly a  pop-up ad displays on the screen. You click on the Popup by mistake and it downloads malware into ur pc or laptop thus infecting it.
 
Identity theft

Identity theft is a cybercrime with the primary goal of illegally obtaining someone’s data. Most commonly, cybercriminals use public Wi-Fi hotspots to steal people’s credit card information and commit financial fraud. With enough information about an individual, cybercriminals can apply for loans, withdraw money, make purchases and commit other crimes all in their name.  

Session Hijacking

Session hijacking is another public WiFi security threat. In this case, an attacker intercepts information about your computer and its connection to websites or other services. Once the attacker has that information, he can configure his own computer to match yours and hijack the connection.

For example, hackers could hijack your connection to your bank's website after you log in. From the bank's end of the connection, it would look like your computer and since you are already logged in, the attacker would have access to everything in your account.

 

 


Comments ()


Sign in

Read Next

Juveniles, Internet and Computer Crime

Blog banner

Process, process creation and process termination

Blog banner

Threads

Blog banner

PYTHON

Blog banner

Art and Culture of Rajasthan

Blog banner

AI and Cyber Security

Blog banner

What is time ? The term which has astonished Scientists

Blog banner

The Essential Guide to Dynamic Arrays vs. Linked Lists: Which to Use and When ?

Blog banner

Love is in air.....

Blog banner

Multiprocessor and Multicore Organization

Blog banner

Steganography

Blog banner

A Survey of Anti-Forensic Techniques: Methods, Challenges, and Countermeasures

Blog banner

Decision Tree: A Diagram Model

Blog banner

A Brief Review on Cyber Forensics and its Analysis Tool

Blog banner

Challenges and risks in service operations

Blog banner

"Geographic Information Systems (GIS) and its Applications in Urban Planning"

Blog banner

Components of GIS

Blog banner

operating system

Blog banner

LIMITED EDITION

Blog banner

Data is an asset and it is your responsibility!

Blog banner

Evolution of operating system

Blog banner

Introduction to Virtual Memory - 080

Blog banner

ProofHub

Blog banner

Data Lakes: A Key to Modern Data Management

Blog banner

Security Issues

Blog banner

ROLE OF THE COMPUTER FORENSICS TOOLS AND TECHNIQUES

Blog banner

MailChimp

Blog banner

Uniprocessor and Types

Blog banner

Article on IT development trends

Blog banner

Multiple-Processor Scheduling in Operating System

Blog banner

About myself

Blog banner

OPERATING SYSTEM

Blog banner

Different Types of Data

Blog banner

Deadlock

Blog banner

File Organization and Access

Blog banner

Social Media Sentiment Analysis

Blog banner

How to invest in Indian Stock Market ? ~ Tutorial 1

Blog banner

Latest Email Marketing Techniques

Blog banner

Consumer to consumer Business model

Blog banner

Virtual Machine

Blog banner

Starvation and Deadlock.

Blog banner

Tomato Butter Sauce with Bucatini

Blog banner