wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Dangers of Using Public WiFis

profile
Aston Dsouza
Aug 18, 2022
2 Likes
0 Discussions
163 Reads

Public Wi-Fi, whether at a public library, coffee shop, railway station, or retail store, makes it simple to connect to the internet from any location. It allows you to send emails, access your bank accounts, and read news items. Should you, however?

Public Wi-Fi, while handy and attractive for users, raises security and privacy problems. For example, free Wi-Fi hotspots do not require authentication to create a network connection, making it easier for hackers to get access to unprotected network equipment. So, what are the most dangerous threats you face while connecting to public Wi-Fi networks?

Packet sniffing or eavesdropping 

Packet sniffing or eavesdropping is the illegal monitoring of data transmitted between devices. Internet users without Wi-Fi hotspot protection risk not only losing critical information but also having their information modified. One doesn’t have to be a master codebreaker to steal personal data on public Wi-Fi. Just having the right gear and  special tools for sniffing is enough.Wire shark is one such tool which can spy on open unsecure packets to get information such as passwords ,usernames and more.

Malware infection  

When you use public WiFi,you open yourself up to browser hijackers, who send malware to innocent web users. You may be opening a news website and suddenly a  pop-up ad displays on the screen. You click on the Popup by mistake and it downloads malware into ur pc or laptop thus infecting it.
 
Identity theft

Identity theft is a cybercrime with the primary goal of illegally obtaining someone’s data. Most commonly, cybercriminals use public Wi-Fi hotspots to steal people’s credit card information and commit financial fraud. With enough information about an individual, cybercriminals can apply for loans, withdraw money, make purchases and commit other crimes all in their name.  

Session Hijacking

Session hijacking is another public WiFi security threat. In this case, an attacker intercepts information about your computer and its connection to websites or other services. Once the attacker has that information, he can configure his own computer to match yours and hijack the connection.

For example, hackers could hijack your connection to your bank's website after you log in. From the bank's end of the connection, it would look like your computer and since you are already logged in, the attacker would have access to everything in your account.

 

 


Comments ()


Sign in

Read Next

Virtual memory

Blog banner

Personalized Movie Recommendations with Data Science

Blog banner

Who decides your overthinking, anyway?

Blog banner

Apache Spark :- Powerful Data Processing Tool

Blog banner

First-Order Logic (FOL): The Foundation of Modern Logic

Blog banner

Service Catalogue Management

Blog banner

Women Empowerment

Blog banner

Advantage of freedom

Blog banner

Risk management in IT

Blog banner

Continual service improvement vs maintenance phase in IT

Blog banner

Cache Memory

Blog banner

Every body is beautiful

Blog banner

Sensory Play for Toddlers: Boosting Curiosity Through Touch, Sound, and Colour

Blog banner

Oracle Corporation

Blog banner

File Management

Blog banner

E-Governance

Blog banner

Which Smartphone Company Has the Largest Market Share in India?

Blog banner

What do you mean by online marketing and why do you need to know about it

Blog banner

Threads

Blog banner

Meal Maharaj — 3 CP, 5 CP, 8 CP. Same Love, Different Portions

Blog banner

Honeypot in cyber security

Blog banner

Booting Process In Operating System

Blog banner

Difference Between Classification And Clustering

Blog banner

Electronic data interchange

Blog banner

Senseless Teeths

Blog banner

TRIGGERS IN DATABASE

Blog banner

Deadlocks in Operating System

Blog banner

E-Cash (Electronic Cash)

Blog banner

Virtual Memory

Blog banner

History of ITIL

Blog banner

Career v/s Job : Choose your passion

Blog banner

Development Of Modern Operating System

Blog banner

10 Alien Encounters and Abduction Stories

Blog banner

You Get Everyone, But No One Gets You: The Lonely Side of High Emotional Intelligence

Blog banner

File system implementation

Blog banner

Memory managment

Blog banner

Natural Language Processing(NLP)

Blog banner

Functions Of Operating Systems

Blog banner

Method of Evaluating Information Security Level in an Organization

Blog banner

Balance

Blog banner

Wedding photographer

Blog banner

Outlook.com

Blog banner