wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Dangers of Using Public WiFis

profile
Aston Dsouza
Aug 18, 2022
2 Likes
0 Discussions
163 Reads

Public Wi-Fi, whether at a public library, coffee shop, railway station, or retail store, makes it simple to connect to the internet from any location. It allows you to send emails, access your bank accounts, and read news items. Should you, however?

Public Wi-Fi, while handy and attractive for users, raises security and privacy problems. For example, free Wi-Fi hotspots do not require authentication to create a network connection, making it easier for hackers to get access to unprotected network equipment. So, what are the most dangerous threats you face while connecting to public Wi-Fi networks?

Packet sniffing or eavesdropping 

Packet sniffing or eavesdropping is the illegal monitoring of data transmitted between devices. Internet users without Wi-Fi hotspot protection risk not only losing critical information but also having their information modified. One doesn’t have to be a master codebreaker to steal personal data on public Wi-Fi. Just having the right gear and  special tools for sniffing is enough.Wire shark is one such tool which can spy on open unsecure packets to get information such as passwords ,usernames and more.

Malware infection  

When you use public WiFi,you open yourself up to browser hijackers, who send malware to innocent web users. You may be opening a news website and suddenly a  pop-up ad displays on the screen. You click on the Popup by mistake and it downloads malware into ur pc or laptop thus infecting it.
 
Identity theft

Identity theft is a cybercrime with the primary goal of illegally obtaining someone’s data. Most commonly, cybercriminals use public Wi-Fi hotspots to steal people’s credit card information and commit financial fraud. With enough information about an individual, cybercriminals can apply for loans, withdraw money, make purchases and commit other crimes all in their name.  

Session Hijacking

Session hijacking is another public WiFi security threat. In this case, an attacker intercepts information about your computer and its connection to websites or other services. Once the attacker has that information, he can configure his own computer to match yours and hijack the connection.

For example, hackers could hijack your connection to your bank's website after you log in. From the bank's end of the connection, it would look like your computer and since you are already logged in, the attacker would have access to everything in your account.

 

 


Comments ()


Sign in

Read Next

VIRTUAL MACHINE

Blog banner

In the world of Technology...

Blog banner

Chicken Dum Biryani

Blog banner

What is thread and multithreading ?

Blog banner

MPL and how its effects?

Blog banner

Socket Programming in Java

Blog banner

AI and cyber Security

Blog banner

What is a Dumpster Diving Attack?

Blog banner

Kernel Memory Allocation In Linux.

Blog banner

Why is online marketing is important in current scenario

Blog banner

Rules and Regulations of Networking: "Standards and Protocols" - Part 1

Blog banner

Importance of education

Blog banner

What is HTML?

Blog banner

ProofHub

Blog banner

Race condition

Blog banner

Spyware

Blog banner

MODERN OPERATING SYSTEM

Blog banner

Skills An Ethical Hacker Must Have

Blog banner

A BLOG ON MYSQL

Blog banner

How Reading Books Shape a Child’s Imagination and Thinking?

Blog banner

Starting Android Activity Using Intent

Blog banner

What if COVID does not exist!

Blog banner

Simple STEM Activities for Toddlers That Spark Curiosity

Blog banner

Efficiency of SQL Injection Method in Preventing E-Mail Hacking

Blog banner

Threads

Blog banner

The Essential Guide to Dynamic Arrays vs. Linked Lists: Which to Use and When ?

Blog banner

virtual machine

Blog banner

IT RISK

Blog banner

First-Order Logic (FOL): The Foundation of Modern Logic

Blog banner

Advantage of freedom

Blog banner

Buffering

Blog banner

Electronic Funds Transfer

Blog banner

10 Signs your Computer has Virus

Blog banner

A-B-C of Networking: Part-3 (Topology [Ring, Tree, Mesh])

Blog banner

File management

Blog banner

E-learning in today's world

Blog banner

A MODERN OPERATING SYSTEM

Blog banner

Getting into anime My anime suggestions

Blog banner

Way to make your meal healthier.

Blog banner

Big Data Architecture

Blog banner

10 Amazing facts about Tokyo Ghoul

Blog banner

Hey Aryan here

Blog banner