wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Dangers of Using Public WiFis

profile
Aston Dsouza
Aug 18, 2022
2 Likes
0 Discussions
163 Reads

Public Wi-Fi, whether at a public library, coffee shop, railway station, or retail store, makes it simple to connect to the internet from any location. It allows you to send emails, access your bank accounts, and read news items. Should you, however?

Public Wi-Fi, while handy and attractive for users, raises security and privacy problems. For example, free Wi-Fi hotspots do not require authentication to create a network connection, making it easier for hackers to get access to unprotected network equipment. So, what are the most dangerous threats you face while connecting to public Wi-Fi networks?

Packet sniffing or eavesdropping 

Packet sniffing or eavesdropping is the illegal monitoring of data transmitted between devices. Internet users without Wi-Fi hotspot protection risk not only losing critical information but also having their information modified. One doesn’t have to be a master codebreaker to steal personal data on public Wi-Fi. Just having the right gear and  special tools for sniffing is enough.Wire shark is one such tool which can spy on open unsecure packets to get information such as passwords ,usernames and more.

Malware infection  

When you use public WiFi,you open yourself up to browser hijackers, who send malware to innocent web users. You may be opening a news website and suddenly a  pop-up ad displays on the screen. You click on the Popup by mistake and it downloads malware into ur pc or laptop thus infecting it.
 
Identity theft

Identity theft is a cybercrime with the primary goal of illegally obtaining someone’s data. Most commonly, cybercriminals use public Wi-Fi hotspots to steal people’s credit card information and commit financial fraud. With enough information about an individual, cybercriminals can apply for loans, withdraw money, make purchases and commit other crimes all in their name.  

Session Hijacking

Session hijacking is another public WiFi security threat. In this case, an attacker intercepts information about your computer and its connection to websites or other services. Once the attacker has that information, he can configure his own computer to match yours and hijack the connection.

For example, hackers could hijack your connection to your bank's website after you log in. From the bank's end of the connection, it would look like your computer and since you are already logged in, the attacker would have access to everything in your account.

 

 


Comments ()


Sign in

Read Next

Os assignment

Blog banner

File management -disha parekh

Blog banner

Tableau

Blog banner

Processes : Process description and control

Blog banner

Data carving - using hex editor

Blog banner

The Bold Digital Marketing Moves That Made Durex India’s Second-Largest Condom Brand

Blog banner

Development Of Modern Operating System

Blog banner

Memory Management Techniques

Blog banner

The Sunny Side of Instagram

Blog banner

Travelling blog

Blog banner

Monday. com App

Blog banner

Protect yourself from System Hacking with these Simple Steps

Blog banner

What is the point of living if we can die at any moment of our lives ?

Blog banner

Severe landslides continue to cause concern in Joshimath, Uttarakhand

Blog banner

Indian Culture and Tradition

Blog banner

Getting started with Android Studio

Blog banner

Types of Malware in Cyber Security

Blog banner

Characteristics of Etherum

Blog banner

Current Trends in GIS and Remote Sensing(Ocean Applications)

Blog banner

5 People who claimed to have Time Traveled

Blog banner

Have You Explored India Yet?

Blog banner

Benefits of Yoga

Blog banner

Uniprocessor Scheduling

Blog banner

Zero Trust Security Model: Revolutionizing Cybersecurity in the Digital Age

Blog banner

Way to make your meal healthier.

Blog banner

Memory management

Blog banner

Security requirements for Safe E-Payments

Blog banner

On-Page SEO

Blog banner

computer security

Blog banner

Cache memory

Blog banner

Vikrant’s first blog

Blog banner

Krishna Rao SAP ID--53003230076

Blog banner

10 Reasons why Monica and Chandler are the best couple ever.!!!

Blog banner

Image Steganography: Hiding Secrets in Plain Sight

Blog banner

Pilgrimage at LOC: A privilege and a paradox

Blog banner

Article on Team Work

Blog banner

The Role of Cyber Forensics in Criminology

Blog banner

IT Service Continuity Management

Blog banner

 " Healing of Yoga "

Blog banner

Developments in Modern Operating Systems

Blog banner

Functions Of Operating Systems

Blog banner

What is Virtual Memory

Blog banner