Escolar Documentos
Profissional Documentos
Cultura Documentos
(https://thevpn.guru/wifi-eavesdropping-hackers-use-unsecured-connection/)
(https://doubleoctopus.com/security-wiki/threats-and-tools/wi-fi-eavesdropping/)
With the 2016 survey suggesting that 58% of public Wi-Fi users typically log into a
personal email account, 56% access social media, and around 22% actually ignore all
conventional wisdom and visit banking or financial websites, that’s a lot of login
credentials, ripe for the picking. And cyber-criminals can use captured login information
directly, to gain access to your personal accounts, or indirectly (selling credentials on to
third parties, wider scale identity theft, etc.).
It’s a great way for them to lay the groundwork for a botnet of devices prior to staging a
Denial of Service (DoS) or Distributed Denial of Service (DDoS) attack on a targeted
website or network. Being able to relay a malicious package to several victims in one
sitting is also a fine opportunity for the distribution of ransomware.
At a basic level, this may just be for personal gain, with unwanted visitors capitalizing on
the free bandwidth. On a more sinister level, multiple sign-ons from unauthorized visitors
could potentially overload the system by exceeding bandwidth limitations or the
capabilities of network hardware, in a form of DoS attack.
For example, the use of a network for the transmission of hate speech, illicit materials
such as child pornography, or the movement of stolen documents and intellectual
property could be going on without the knowledge or endorsement of the network
administrators – but if the practices come to light, it’s the Wi-Fi providers who could end
up paying the consequences.
Though clearly, the dangers of using unsecured Wi-Fi are many, there are some measures
that users can take to ensure their safety.
2. What is at risk?
How to Prevent This Threat: Users should confirm the validity of a network before connecting.
Once on wifi, users can ensure their data is encrypted and difficult to access by using a virtual
private network (VPN). Businesses can provide VPN access to their remote employees through a
firewall, such as a SonicWall TZ300. A firewall is also the solution for a business offering wifi
access, like one with built-in wifi, such as a FortiWiFi device.
(https://www.firewalls.com/blog/security-terms/wifi-eavesdropping/)
(https://thevpn.guru/wifi-eavesdropping-hackers-use-unsecured-connection/)
Managed Privacy
Keeping in mind that identity theft is one of the prime movers for Wi-Fi hacking, take
steps to broadcast as little information about yourself and your resources, as possible.
Check the privacy settings on your device, and turn off any file sharing features that could
give cyber-criminals free access to your public folders. You should restrict the kinds of
information you keep in such folders, in any case.
There are options that may be set on a site by site basis (look out for Facebook, as sessions
may start with HTTPS but switch to open transmission unless you specify Secure
Browsing in your security options). There are also dedicated browser extensions (“HTTPS
Everywhere”, and the like) that attempt to force a secure web connection with every site,
even if this isn’t their default option.
Security Barriers
Finally, the age-old wisdom of having a well-configured firewall (corporate or personal)
filtering transmissions to and from the network, and an up to date suite of security
software (anti-malware, anti-keylogger, etc.) still holds.
With free public Wi-Fi access now a common feature at a range of gathering places – and
Wi-Fi networks providing a boost to cellphone coverage in many problem areas –
the dangers of unsecured wireless connections will continue to be a concern. But knowing
the risks and the steps you can take to eliminate them will help you negotiate safe passage
through any hotspot.
(https://www.finjanmobile.com/the-dangers-of-using-unsecured-wi-fi/)
VIDEOS: