wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Dangers of Using Public WiFis

profile
Aston Dsouza
Aug 18, 2022
2 Likes
0 Discussions
163 Reads

Public Wi-Fi, whether at a public library, coffee shop, railway station, or retail store, makes it simple to connect to the internet from any location. It allows you to send emails, access your bank accounts, and read news items. Should you, however?

Public Wi-Fi, while handy and attractive for users, raises security and privacy problems. For example, free Wi-Fi hotspots do not require authentication to create a network connection, making it easier for hackers to get access to unprotected network equipment. So, what are the most dangerous threats you face while connecting to public Wi-Fi networks?

Packet sniffing or eavesdropping 

Packet sniffing or eavesdropping is the illegal monitoring of data transmitted between devices. Internet users without Wi-Fi hotspot protection risk not only losing critical information but also having their information modified. One doesn’t have to be a master codebreaker to steal personal data on public Wi-Fi. Just having the right gear and  special tools for sniffing is enough.Wire shark is one such tool which can spy on open unsecure packets to get information such as passwords ,usernames and more.

Malware infection  

When you use public WiFi,you open yourself up to browser hijackers, who send malware to innocent web users. You may be opening a news website and suddenly a  pop-up ad displays on the screen. You click on the Popup by mistake and it downloads malware into ur pc or laptop thus infecting it.
 
Identity theft

Identity theft is a cybercrime with the primary goal of illegally obtaining someone’s data. Most commonly, cybercriminals use public Wi-Fi hotspots to steal people’s credit card information and commit financial fraud. With enough information about an individual, cybercriminals can apply for loans, withdraw money, make purchases and commit other crimes all in their name.  

Session Hijacking

Session hijacking is another public WiFi security threat. In this case, an attacker intercepts information about your computer and its connection to websites or other services. Once the attacker has that information, he can configure his own computer to match yours and hijack the connection.

For example, hackers could hijack your connection to your bank's website after you log in. From the bank's end of the connection, it would look like your computer and since you are already logged in, the attacker would have access to everything in your account.

 

 


Comments ()


Sign in

Read Next

Virus

Blog banner

Boxing

Blog banner

21ST CENTURY PATRIARCHY

Blog banner

Starting Android Activity Using Intent

Blog banner

Tomato Butter Sauce with Bucatini

Blog banner

Photography

Blog banner

Data Exfiltration

Blog banner

WomenEmpowerment

Blog banner

Dudhasagar waterfall ?

Blog banner

Why Are So Many Adults Getting Diagnosed with ADHD?

Blog banner

The Role of Summer Camps in Early Childhood Development

Blog banner

Article on team management software

Blog banner

Mariana Trench: The deepest depths

Blog banner

OS Assignment-3

Blog banner

Why Summer Break Is Important for Emotional and Cognitive Growth?

Blog banner

Precision-Recall in Data Science

Blog banner

Search Marketing In 2026: From Keywords To Credibility And User Intent

Blog banner

What is Email? Uses of Emails

Blog banner

Buffering

Blog banner

IT Service as as Value Creation

Blog banner

Music helps reduce stress

Blog banner

Maharashtrian culture: Tradition, Art, Food

Blog banner

Why Skipping Afternoon Meals Affects More Than Just Your Hunger?

Blog banner

Modern Operating System - Khush Bagaria

Blog banner

GIS in Disaster Management

Blog banner

Capacity management in ITSM

Blog banner

The Joy of Giving: How Festivals Teach Children Empathy and Gratitude

Blog banner

What is Packet Filtering?

Blog banner

Virtualization

Blog banner

File Systems in OS.

Blog banner

Linux Threads:

Blog banner

Why Data Security Is Important

Blog banner

Simple AI Symptom Diagnosis Using LISP – Rule-Based Expert System

Blog banner

Linux Virtual Machine Process Scheduling

Blog banner

Types of email

Blog banner

Hosting basics

Blog banner

Quality check in IT services

Blog banner

Blockchain

Blog banner

ONLINE NEWSROOMS

Blog banner

Man is free by the birth .

Blog banner

Exploring Virtual Machines and Computer Forensic Validation Tools

Blog banner

Operating Systems

Blog banner