wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Dangers of Using Public WiFis

profile
Aston Dsouza
Aug 18, 2022
2 Likes
0 Discussions
163 Reads

Public Wi-Fi, whether at a public library, coffee shop, railway station, or retail store, makes it simple to connect to the internet from any location. It allows you to send emails, access your bank accounts, and read news items. Should you, however?

Public Wi-Fi, while handy and attractive for users, raises security and privacy problems. For example, free Wi-Fi hotspots do not require authentication to create a network connection, making it easier for hackers to get access to unprotected network equipment. So, what are the most dangerous threats you face while connecting to public Wi-Fi networks?

Packet sniffing or eavesdropping 

Packet sniffing or eavesdropping is the illegal monitoring of data transmitted between devices. Internet users without Wi-Fi hotspot protection risk not only losing critical information but also having their information modified. One doesn’t have to be a master codebreaker to steal personal data on public Wi-Fi. Just having the right gear and  special tools for sniffing is enough.Wire shark is one such tool which can spy on open unsecure packets to get information such as passwords ,usernames and more.

Malware infection  

When you use public WiFi,you open yourself up to browser hijackers, who send malware to innocent web users. You may be opening a news website and suddenly a  pop-up ad displays on the screen. You click on the Popup by mistake and it downloads malware into ur pc or laptop thus infecting it.
 
Identity theft

Identity theft is a cybercrime with the primary goal of illegally obtaining someone’s data. Most commonly, cybercriminals use public Wi-Fi hotspots to steal people’s credit card information and commit financial fraud. With enough information about an individual, cybercriminals can apply for loans, withdraw money, make purchases and commit other crimes all in their name.  

Session Hijacking

Session hijacking is another public WiFi security threat. In this case, an attacker intercepts information about your computer and its connection to websites or other services. Once the attacker has that information, he can configure his own computer to match yours and hijack the connection.

For example, hackers could hijack your connection to your bank's website after you log in. From the bank's end of the connection, it would look like your computer and since you are already logged in, the attacker would have access to everything in your account.

 

 


Comments ()


Sign in

Read Next

Memory Management in Operating System

Blog banner

Proof-of-Stake (PoS)

Blog banner

Strengthening Active Directory Security

Blog banner

Brain wash of social media

Blog banner

How to setup a professional looking business account on Instagram?

Blog banner

Challenges of Digital forensics in cloud computing environment

Blog banner

Jira Software

Blog banner

Service transistion under difficult conditions

Blog banner

Data Exfiltration

Blog banner

AI & Data Science in Healthcare – Predicting diseases, medical imaging analysis

Blog banner

Making Money through Instagram

Blog banner

Yoga in INDIA and ABROAD

Blog banner

Deadlock in operating system

Blog banner

Biometric Authentication Vulnerabilities

Blog banner

I/O Buffering

Blog banner

Full Disk Encryption on Digital Forensics

Blog banner

Ghee vs. Coconut Oil vs. Mustard Oil: Which Cooking Fat Wins for Indian Food?

Blog banner

New Horizon Europe project ‘EvoLand’ sets off to develop new prototype services.

Blog banner

E-Governance

Blog banner

Partnership in Learning: How Parent Involvement Shapes a Child’s Early Education

Blog banner

SEIZING DIGITL EVIDENCE AT THE SCENE

Blog banner

Install Ubuntu Easily

Blog banner

Street foods

Blog banner

WINDOWS I/ O

Blog banner

Functions of Operating System

Blog banner

Are Social Media Paid Campaigns Worth It?

Blog banner

Deadlock

Blog banner

Tools to support CSI activities

Blog banner

Modern Operating System - Khush bagaria

Blog banner

E-Cash (Electronic Cash)

Blog banner

OPERATING SYSTEM

Blog banner

Number Guessing game --lisp

Blog banner

OS Assignment-3

Blog banner

All you need to know about “On-page SEO”

Blog banner

Facebook Shut Down an AI Program!!! Facebook AI bots became Terminators???

Blog banner

Thumb Sucking: When It’s Normal and When It Becomes a Dental Problem

Blog banner

Indian Culture and Tradition

Blog banner

FRIENDSHIP

Blog banner

To travel is to live

Blog banner

Life

Blog banner

NETSUITE

Blog banner

Teenagers of Today

Blog banner