Transcript

How Safe Is That Wifi?

How Safe Is That Wifie By the end of 2014, The Growth Of Wifi the number of mobile-connected devices will exceed the number GLOBAL NUMBER OF PUBLIC HOTSPOTS 8 actual numbers and predicted growth of people on Earth. 4.5 Million And, by 2018, there will be over 10 billion mobile-connected devices, Million 3.3 2.1 Million 1.3 Million including machine-to-machine (M2M) modules, exceeding the predicted world population of 7.6 billion people (1.4 mobile devices per capita.) 0.5 0.8 Million Million Million 2009 2010 2011 2012 2013 2014 2015 MOBILE DATA TRAFFIC GROWTH 15 9 In 2011, the number of wifi hotspots reached 1.3 million worldwide. By 2015, wifi users will be able to connect to 5.8 million hotspots, according to a report commissioned by the Wireless Broadband 1 Exabyte = 1 Billion Gigabytes 10.8 Exabytes 7.0 4.4 Exabytes 2.6 Exabytes Exabytes 64% of hotels offer free wifi 1.5 Exabytes Exabytes Alliance. 2013 2014 2015 2016 2017 2018 The Safety Of Public Wifi WHERE YOU SHOULD BE CAUTIOUS OF USING PUBLIC WIFI NETWORKS: Everywhere, but especially. Train Stations & On Trains Airports & On Airplanes Bus Stations & On Buses Hackers and those who commit fraud like to use fake wifi hotspots to steal information, both personal and financial. Public wifi that is considered "safe" is actually non-existent. These unsecured networks put people very close to becoming fraud victims. Coffee Shops HOW HACKERS USE PUBLIC WIFI NETWORKS TO STEAL YOUR IDENTITY: 1. The Sniffer Software Method 3. Sidejacking or Session Highjacking 2. Address Resolution Protocol (ARP) Spoofing This software allows the hacker to monitor traffic going to and from a computer connected to public wifi. This method of digital eavesdropping allows the hacker to capture emails, texts, personal, and financial information. This method redirects the network traffic to the hacker, blocking or modifying it altogether, while remaining undetected. This type of attack can lead to another type of attack known as "sidejacking." After a hacker "sniffs" a hotspot user's web activity, they use the information to clone the user's account. This commonly occurs when a user logs in to a website not protected by HTTPS. Once the clone is made, the hacker can do everything the user can do on the site. 4. Evil Twin or WiPhishing 5. Man-in-the-Middle Attack PASSWORD This is when a hacker designs their own hotspot to look like a real hotspot. When the user logs in, they expose all of their passwords and information to the hacker. These spots can be launched from up to 300 feet away. This is the second stage of an "Evil Twin" hack. The hacker can see all of the user's web traffic, steal account information, and password information. Some hackers can even control which websites the user sees. 6. Ad Hoc or Peer-to-Peer Networks 7. Rogue Ad Học Networks THE BEST PLACES TO USE WIFI NETWORKS: FREE If two little computer symbols appear when you're trying to connect to a wireless network, that means you're actually connecting to someone else's laptop. Once you connect to a network like that, all of your shared files can be accessed by every other computer on the network. Hackers give these networks names like "Free Public Wifi" to try and get users to connect wherever there is public wifi. Not all ad hoc networks are created by hackers, though it is impossible to distinguish the real ones from the fake ones. Your home or the home of a friend or family member Your work or office Conditions: 1. That connecting to and using the wifi is authorized by your employer. 2. That the wifi network is secure and requires a complicated password to join. A good password should consist of letters (both upper and lower case), numbers, and different punctuations or characters. Before You Connect To Any Wifi Network FOLLOW THESE SAFETY TIPS: Turn off sharing on your phone. If you have an iPhone, the "Airdrop" option might be activated, make sure it is off. Confirm the proper wifi network Turn on your firewall. If you do not have a firewall and often use public wifi hotspots, consider adding a firewall to your device. Run anti-virus software on your device. Make sure your device is set to not automatically passwords on connect to public wifi hotspots. Be sure to use HTTPS websites. These are Make sure you never store name with the manager of your location. your laptop or mobile device. more secure than standard HTTP sites. ONOOFF What You Should Absolutely Not Do Public wifi networks WHILE CONNECTED TO A PUBLIC WIFI NETWORK: are unsecured and there are 1. Conduct any financial transactions This includes banking and shopping. 3. Send any sensitive several ways a hacker could see or access texts. personal, financial, and business-oriented 2. Send any sensitive e-mails. 4. Access confidential information from your workplace. information that may harm one's identity or business. SECURE Sources : www.blog.lifestore.aol.com | www.wballiance.com | www.cisco.com www.gizmag.com | www.sandiego.gov | www.idtheftcenter.org www.blog.laptopmag.com DATA RECOVERY www.SecurebataRecovery.com

How Safe Is That Wifi?

shared by Michaelson on Apr 01
846 views
3 shares
0 comments
Wifi Internet connections are everywhere these days, but do you know how safe they are? While you might think connecting to a public or private wifi hotspot is fun and useful, it can also be dangerous...

Category

Technology
Did you work on this visual? Claim credit!

Embed Code

For hosted site:

Click the code to copy

For wordpress.com:

Click the code to copy
Customize size