wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Dangers of Using Public WiFis

profile
Aston Dsouza
Aug 18, 2022
2 Likes
0 Discussions
163 Reads

Public Wi-Fi, whether at a public library, coffee shop, railway station, or retail store, makes it simple to connect to the internet from any location. It allows you to send emails, access your bank accounts, and read news items. Should you, however?

Public Wi-Fi, while handy and attractive for users, raises security and privacy problems. For example, free Wi-Fi hotspots do not require authentication to create a network connection, making it easier for hackers to get access to unprotected network equipment. So, what are the most dangerous threats you face while connecting to public Wi-Fi networks?

Packet sniffing or eavesdropping 

Packet sniffing or eavesdropping is the illegal monitoring of data transmitted between devices. Internet users without Wi-Fi hotspot protection risk not only losing critical information but also having their information modified. One doesn’t have to be a master codebreaker to steal personal data on public Wi-Fi. Just having the right gear and  special tools for sniffing is enough.Wire shark is one such tool which can spy on open unsecure packets to get information such as passwords ,usernames and more.

Malware infection  

When you use public WiFi,you open yourself up to browser hijackers, who send malware to innocent web users. You may be opening a news website and suddenly a  pop-up ad displays on the screen. You click on the Popup by mistake and it downloads malware into ur pc or laptop thus infecting it.
 
Identity theft

Identity theft is a cybercrime with the primary goal of illegally obtaining someone’s data. Most commonly, cybercriminals use public Wi-Fi hotspots to steal people’s credit card information and commit financial fraud. With enough information about an individual, cybercriminals can apply for loans, withdraw money, make purchases and commit other crimes all in their name.  

Session Hijacking

Session hijacking is another public WiFi security threat. In this case, an attacker intercepts information about your computer and its connection to websites or other services. Once the attacker has that information, he can configure his own computer to match yours and hijack the connection.

For example, hackers could hijack your connection to your bank's website after you log in. From the bank's end of the connection, it would look like your computer and since you are already logged in, the attacker would have access to everything in your account.

 

 


Comments ()


Sign in

Read Next

Process states

Blog banner

The khan mehtab transforming the modular switches company

Blog banner

Health and fitness

Blog banner

A Heartfelt Act of Kindness

Blog banner

Patola Outfits for the Modern Wardrobe: Reviving Indian Handloom in Style

Blog banner

Cache Memory

Blog banner

Ethical Hacking

Blog banner

Threads in OS

Blog banner

Deadlock

Blog banner

Predicting Student Performance with Data Science

Blog banner

Challenges and risks in service operations

Blog banner

The Art Of Getting What You Want In Life....

Blog banner

Intrusion Detection System

Blog banner

Top 3 Places To Stay In Vienna

Blog banner

Python as a tool for Data science task & project

Blog banner

Wiretapping

Blog banner

Benefits of Yoga

Blog banner

Simple AI Symptom Diagnosis Using LISP – Rule-Based Expert System

Blog banner

Reclaim Your Bite and Beauty: All About Dental Restorative Treatments

Blog banner

Flipkart

Blog banner

Concurrency management in operating systems

Blog banner

5 Powerful Mindset Shifts To Make 2026 Your Breakthrough Year

Blog banner

The Future of Patola Weaving in a Sustainable Fashion World

Blog banner

What are the different types of E-mail crime and process of email forensic?

Blog banner

Types of OS

Blog banner

Threading

Blog banner

Memory Management in Operating System

Blog banner

Memory Management

Blog banner

Uniprocessor scheduling

Blog banner

Different types of scam frauds

Blog banner

Policies for Service Transition

Blog banner

Virtual machine

Blog banner

Incident management in ITSM

Blog banner

How to lose belly fat

Blog banner

Uniprocessor and Types

Blog banner

Android Flashlight Application

Blog banner

Music helps reduce stress

Blog banner

Linux

Blog banner

Platonic Solids

Blog banner

Precision-Recall in Data Science

Blog banner

Python as a tool for data analysis

Blog banner

Beautiful and stunning natural phenomena worth to see

Blog banner