Hacker Noon - Public WiFi Is The Devil ⛔

 


LAST CHANCE - Grab NordVPN at 70% OFF

Public Wi-Fi Is The Devil

 

The recent booming of public Wi-Fi has been an advantage for working people. Even before this whole pandemic thing, lots of employees used to work from remote locations (Alexa, play Bored in the house). Anyway, free access points are available at bookstores, airports, cafes, and ... basically anywhere with people.

That said, here comes a joke on how easily accessible public Wifi networks are today:

 
A teenager at a funeral asks the priest for the wifi password.

The priest is shocked and asks the boy, "Have you no respect for the dead?"

The boy responds, "Is that uppercase or lowercase?"

Ok, that may be too true to be funny. But tell me, what is the first thing you do when you sit down for a bite? Hint: ask for the Wifi password.

 

However, often being a blessing for freelancers and remote employees, free Wi-Fi comes at a price.


 

Here are some risks you should be aware of when using a public Wi-Fi spot:

1. Rogue Wi-Fi networks

An attacker sets up a honeypot in the form of a free Wi-Fi hotspot. Thus, he can get all data exchanged over the network.

 

On the eve of the international exhibition Mobile World Congress 2016, Avast employees carried out an experiment. The day before the opening, several Wi-Fi access points with Starbucks SSIDs, Airport_Free_Wifi_AENA, and MWC Free WiFi were deployed at the Barcelona airport. Avast's goal was to demonstrate how much users put themselves at risk while using public Wi-Fi hotspots.

In just four hours, Avast harvested over 8 million packets of data from more than two thousand users. Of course, all data was immediately deleted. But still, it is a nice example of our carelessness and a danger public Wi-fi can present.

Also, according to Kaspersky, more than 20% of hotspots worldwide lack password and encryption protection. The study revealed that a further 3% of hotspots use the outdated Wired Equivalent Privacy (WEP) protocol. This makes the hotspots extremely vulnerable to hackers.


Welcome NordVPN, today's newsletter sponsor. NordVPN offers high-quality P2P support for smooth surfing. No-logs policy and strong encryption are part of their core service.

They're offering a 70% discount to Hacker Nooners until August 17th. Grab yours here.

 

What's next?

 

2.  Man-in-the-middle attack

This term refers to the process when an attacker places himself in a two-party conversation. His goal is either to eavesdrop or to impersonate one of the parties. Next thing we know, he can steal personal data like login credentials or credit card details.


 

The well-known non-cryptographic "man in the middle" attack was carried out by a Belkin wireless network router in 2003. From time to time, the new model of the router chose a random HTTP connection and redirected it to an advertisement page of its manufacturer. Such behavior of the device certainly caused a storm of indignation among users, after which this "feature" was removed from later versions of the router firmware. 

In 2011 the security breach of the Dutch certification center DigiNotar led to fraudulent issuance of certificates. Subsequently, the fraudulent certificates were used to carry out "man in the middle" attacks.

In 2013 it became known that Nokia's Xpress Browser decrypts HTTPS traffic on Nokia proxy servers, providing companies with clear text access to their customers' browser's encrypted traffic. Nokia stated that the content was not permanently stored and that the company had organizational and technical measures in place to prevent access to private information.


We’ll talk more about the risks of public Wi-Fi later. In the meantime, there is a simple tool that will help you fight off hackers. And it’s the almighty VPN.


Did you see it?

Since it encrypts your information, all personal dets will be safe and sound. So please, make an effort and get one on all your devices.

 

Start a new life, get NordVPN. They're offering a 70% discount to Hacker Nooners until August 17th. Grab yours here.

 



LAST CHANCE - Grab NordVPN at 70% OFF

Twitter
Facebook
Instagram
Website
YouTube
Email
Copyright © 2020 Hacker Noon. All rights reserved.

Our mailing address is:
PO Box 2206, Edwards CO, 81632, U.S.A.

unsubscribe

Older messages

The Noon Notification 

Friday, August 14, 2020

7 Common Coding Mistakes · Open Source Myths · 8 ML Resources to Learn Data Structures/Algorithms · Are Privacy Crypto Wallets Legit? · #BackToTheInternet TODAY'S TOP TECH STORIES Democratizing

The Noon Notification 

Thursday, August 13, 2020

7 Common Coding Mistakes · Open Source Myths · 8 ML Resources to Learn Data Structures/Algorithms · Are Privacy Crypto Wallets Legit? · #BackToTheInternet TODAY'S TOP TECH STORIES Noonies 2020

The Noon Notification 

Tuesday, August 11, 2020

How to Build and Launch Products in 24hrs · Did VOLD-emort Just Kill My App? · 10 Ways to Run Better Remote Meetings · LAST DAY to Nom a NOONIE❗· #BackToTheInternet TODAY'S TOP TECH STORIES in

The Noon Notification 

Monday, August 10, 2020

Tests Are Not Tests · I Built 1 Browser Extension To Rule Them All · New iPhone 12 Design · Coding for Beginners: Languages, Courses, Platforms · #BackToTheInternet TODAY'S TOP TECH STORIES WEBINAR

The Noon Notification 

Saturday, August 8, 2020

Engineering Metrics are Now Business Metrics · The Burgeoning Global Surveillance State · 🚀 LIST: ALL AWARDS, 200+ Noonies · Apple's Stock Split · #BackToTheInternet TODAY'S TOP TECH STORIES

You Might Also Like

Import AI 399: 1,000 samples to make a reasoning model; DeepSeek proliferation; Apple's self-driving car simulator

Friday, February 14, 2025

What came before the golem? ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏

Defining Your Paranoia Level: Navigating Change Without the Overkill

Friday, February 14, 2025

We've all been there: trying to learn something new, only to find our old habits holding us back. We discussed today how our gut feelings about solving problems can sometimes be our own worst enemy

5 ways AI can help with taxes 🪄

Friday, February 14, 2025

Remotely control an iPhone; 💸 50+ early Presidents' Day deals -- ZDNET ZDNET Tech Today - US February 10, 2025 5 ways AI can help you with your taxes (and what not to use it for) 5 ways AI can help

Recurring Automations + Secret Updates

Friday, February 14, 2025

Smarter automations, better templates, and hidden updates to explore 👀 ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏

The First Provable AI-Proof Game: Introducing Butterfly Wings 4

Friday, February 14, 2025

Top Tech Content sent at Noon! Boost Your Article on HackerNoon for $159.99! Read this email in your browser How are you, @newsletterest1? undefined The Market Today #01 Instagram (Meta) 714.52 -0.32%

GCP Newsletter #437

Friday, February 14, 2025

Welcome to issue #437 February 10th, 2025 News BigQuery Cloud Marketplace Official Blog Partners BigQuery datasets now available on Google Cloud Marketplace - Google Cloud Marketplace now offers

Charted | The 1%'s Share of U.S. Wealth Over Time (1989-2024) 💰

Friday, February 14, 2025

Discover how the share of US wealth held by the top 1% has evolved from 1989 to 2024 in this infographic. View Online | Subscribe | Download Our App Download our app to see thousands of new charts from

The Great Social Media Diaspora & Tapestry is here

Friday, February 14, 2025

Apple introduces new app called 'Apple Invites', The Iconfactory launches Tapestry, beyond the traditional portfolio, and more in this week's issue of Creativerly. Creativerly The Great

Daily Coding Problem: Problem #1689 [Medium]

Friday, February 14, 2025

Daily Coding Problem Good morning! Here's your coding interview problem for today. This problem was asked by Google. Given a linked list, sort it in O(n log n) time and constant space. For example,

📧 Stop Conflating CQRS and MediatR

Friday, February 14, 2025

​ Stop Conflating CQRS and MediatR Read on: m​y website / Read time: 4 minutes The .NET Weekly is brought to you by: Step right up to the Generative AI Use Cases Repository! See how MongoDB powers your