Username: Save?
Password:
Home Forum Links Search Login Register*
    News: Welcome to the TechnoWorldInc! Community!
Recent Updates
[April 24, 2024, 11:48:22 AM]

[April 24, 2024, 11:48:22 AM]

[April 24, 2024, 11:48:22 AM]

[April 24, 2024, 11:48:22 AM]

[April 03, 2024, 06:11:00 PM]

[April 03, 2024, 06:11:00 PM]

[April 03, 2024, 06:11:00 PM]

[April 03, 2024, 06:11:00 PM]

[March 06, 2024, 02:45:27 PM]

[March 06, 2024, 02:45:27 PM]

[March 06, 2024, 02:45:27 PM]

[March 06, 2024, 02:45:27 PM]

[February 14, 2024, 02:00:39 PM]
Subscriptions
Get Latest Tech Updates For Free!
Resources
   Travelikers
   Funistan
   PrettyGalz
   Techlap
   FreeThemes
   Videsta
   Glamistan
   BachatMela
   GlamGalz
   Techzug
   Vidsage
   Funzug
   WorldHostInc
   Funfani
   FilmyMama
   Uploaded.Tech
   MegaPixelShop
   Netens
   Funotic
   FreeJobsInc
   FilesPark
Participate in the fastest growing Technical Encyclopedia! This website is 100% Free. Please register or login using the login box above if you have already registered. You will need to be logged in to reply, make new topics and to access all the areas. Registration is free! Click Here To Register.
+ Techno World Inc - The Best Technical Encyclopedia Online! » Forum » THE TECHNO CLUB [ TECHNOWORLDINC.COM ] » Ethical Hacking / Security / Viruses » Security
 Public Wi-Fi Hotspot Security Tips - Why Your Data Isn't Secure and What You Can
Pages: [1]   Go Down
  Print  
Author Topic: Public Wi-Fi Hotspot Security Tips - Why Your Data Isn't Secure and What You Can  (Read 949 times)
Stephen Taylor
TWI Hero
**********



Karma: 3
Offline Offline

Posts: 15522

unrealworld007
View Profile


As more people acquire laptops and begin making use of public Wi-Fi hotspots, hackers are able to easily exploit vast security vulnerabilities inherent in most public hotspot deployments. What follows are four specific security vulnerabilities along with our "best practice" recommendations to overcome them.

Security Threat #1: The Evil Twin

An "evil twin" can be a laptop in a hacker’s backpack set-up to trick users into logging onto the Internet via their "rogue" connection by mimicking the legitimate hotspot’s network name and login page (where applicable). Once logged on, the hacker can create fake login prompts for popular email and banking applications thereby stealing the user’s most valued login credentials.

What can be done to guard against such attacks? Look for connections that offer an SSL-encrypted login page (evidenced by https versus http in the address bar and a lock in the lower right hand corner of your web browser) that has been verified as authentic by public authorities such as Thawte or Versign. 82nd Street Wireless offers such a secure connection.

Security Threat #2: Unencrypted Wireless Data

Most public Wi-Fi hotspots disable wireless data encryption standards such as WEP and WPA as one user’s "secret key" can be used by a hacker to decrypt the entire network’s traffic thus making such keys both ineffective and unnecessarily complex for public deployments. What this means is that a hacker can view your data (email and web pages) as they travel through the air between your laptop and the wireless router using command line utilities found in certain operating systems.

The solution is to use a VPN (Virtual Private Network) which creates a secure encrypted connection between your laptop and the VPN server. You can find such solutions at 82nd Street Wireless.

Security Threat #3: Inappropriate Configuration of Wireless Network Settings

Wireless local area networks were designed so that computers sharing the network could easily access and share data amongst themselves. As such, in many public hotspot deployments, a hacker can obtain direct access to your computer unless you configure your wireless network settings as follows: turn your firewall on, disable file sharing and turn ad-hoc mode off. Those setting can be found in Windows XP via Start > Settings > Network Connections > Wireless Network Connection.

82nd Street Wireless automatically disables others from accessing your device via what is referred to as "client isolation".

Security Threat #4: Operating System Vulnerabilities

As hackers are well know for exploiting operating system vulnerabilities, you’ll want to stay on top of both operating system updates and anti-virus updates which fortunately can be automated through the "automatic update" feature offered by the major brands in both product categories.

By employing the afore-mentioned security tips, your data will stay out of the unscrupulous hands of hackers while you continue to enjoy the benefits of public wireless Internet at your favorite Wi-Fi hotspot location.

About the author: Wade McMunn is President of Wireless Internet Provider – 82nd Street Wireless @ http://www.wirelessinternetprovider.net

Logged

Pages: [1]   Go Up
  Print  
 
Jump to:  

Copyright © 2006-2023 TechnoWorldInc.com. All Rights Reserved. Privacy Policy | Disclaimer
Page created in 0.151 seconds with 24 queries.