The PRIVATE WiFi Blog

Search By Topic:

Popular Topics:



PRIVATE WiFi

The PRIVATE WiFi Blog

Thought Leadership | Jul 18th, 2011

How Hard Is It to Hack Wifi?

Kent Lawson

From my conversations, with customers, friends – and even my mother, it is clear that most people think that hacking wifi requires a lot of expertise.

It takes a geek, right?

Unfortunately, that is not the case at all. There are plenty of free software tools out there, including some 20,000 YouTube videos showing how to use them.

What's really interesting is a small experiment conducted by a UK company called CPPGroup.

As reported by eSecurityPlanet, CPP simply showed volunteers a fourteen minute video on how to conduct a man-in-the-middle (MITM) attack.

As we have previously reported, MITM allows a hacker to view all communication between a laptop and the Internet -- unless it is encrypted, of course.

The volunteers, which included a TV producer, a baker, and a retiree, were then able to turn their own, ordinary laptops into hacking devices. Within minutes, they could surreptitiously access login details, including passwords, for email accounts, social networking sites, and online shopping sites.

How much of this really goes on? Does it really matter? To find out, CPPGroup also commissioned a survey of UK Internet users.

They found that:

  • One in four people have had their personal emails intercepted.
  • 16% have had their social networking profiles hacked.
  • One in five have had their eBay accounts hacked.
  • 10% have had money or loans taken out in their names.

As eSecurityPlanet concludes, “The Golden Rule is that unless you know your connection is secure, do not communicate any information or data that you wouldn't feel comfortable shouting across a crowded room.”

You are safe on your home wifi network (assuming you have it set up properly) or on your network at work. Everywhere else, the only way to protect yourself is with a personal VPN, such as PRIVATE WiFi™.

Associated Topics:

Associated Topics:

Comments

Related Posts

E-filing: The Fastest and Safest Way to File Taxes?

Thought Leadership
Eva Velasquez | Mar 9th, 2015

E-filing your annual return to the IRS offers speed and convenience and when coupled with industry-approved software that can plug in the values for you, a lot of the headaches traditionally associated with doing your taxes are eliminated. However, there are some potential dangers that you should be aware of, such as insecure public WiFi networks and online tax fraud. Read More

FTC Says Hotel WiFi is Dangerous

Thought Leadership
Kent Lawson | Feb 23rd, 2015

Recently, the FTC posted an article on their website stating that hotel WiFi is dangerous and that users should not assume that just because they pay for Internet access that their connection is secure.

We couldn’t agree more. In fact, I have been stating this fact since we launched PRIVATE WiFi nearly five years ago.  This is an important topic because hotel traveler’s rank WiFi access at hotels as the number one amenity that they look for when booking hotel rooms. Read More

Managing BYOD Security Threats: VPNs Mitigate The Risks

Thought Leadership
Kent Lawson | Jan 28th, 2015

It’s clear that the era of BYOD is here to stay. Workers are no longer confined to an office desk and computer, and instead are able to do work from anywhere: home, their local coffee shop, and while taking public transportation. The proliferation of public wireless networks has made this possible, and while this has freed employees up to do work from nearly everywhere, it also has introduced many security challenges. Read More

Identity Protection: 5 Tips to Stay Mobile Secure in 2015

Thought Leadership
Eva Velasquez | Jan 8th, 2015

Living a mobile lifestyle does not come without risk, especially where your identity is concerned. But staying mobile secure doesn’t have to be complicated. Consider this: 94.2% of identity victims say they are still highly engaged online and via their mobile devices despite having had their personally identifiable information stolen, according to a recent study from The Identity Theft Resource Center.

So how do we stay safe? Just follow these five tips! Read More

X

Thank you for subscribing to our newsletters

Your email has been added to our system. You will be e-mailed shortly with a request to confirm your membership. Please make sure to click the link in that message to confirm your subscription.