During that event, the audience viewed three videos that
demonstrated the capabilities of criminals to enter your PC, laptop, tablet or
Smartphone. Three methods that criminals can use to break into your
computerized device include:
- The Evil Twin Attack. A hacker will set up shop in or near a
coffee shop, hotel, or airport where there is free Wi-Fi. The hacker will
set up a fake access point and might use the same name as the coffee shop
or hotel or it might be named “free airport Wi-Fi” or “free hotel Wi-Fi.” The
fake access point will have a signal that may be stronger than the
legitimate access point. The hacker can lurk in the background to collect
id’s and passwords or he can have a message sent to your device telling
you that you need to pay for access in an attempt to collect your bankcard
information. So, if you are expecting free Wi-Fi and are asked to pay for
it, get off of that access point. Watch this video for more information on
the Evil Twin Attack:
- War Driving. A hacker will drive through a neighborhood with
his portable computer or smartphone and special software that can detect
the active Wi-Fi access points. The hacker is looking for access points
that use older and weaker security protocols such as WEP. The newest
protocol is WPA2. Check your router for the security protocol and make
sure that it uses WPA2. If you cannot change the protocol in the router’s
settings, purchase a new router. Watch this video for more information on
War Driving:
- “Man-in-the-middle” Attack. A hacker inserts himself between
your computer and any other computers that you are communicating with. By
receiving your signal, the hacker can intercept any passwords or account
numbers that you might be using. This attack can be used with free or
unsecured Wi-Fi connections. For more information about the Man-in-the-middle
Attack, take a look at this video:
- Treat all Wi-Fi signals
with suspicion.
- Consider using your cell
phone. The data signal for your cell phone provider is considered safe
from intruders. If you need to access a social networking, online shopping
or banking site, use your cell phone’s data plan.
- Protect you device against
cyber-attacks. All of your devices should have up to date anti-malware and
anti-virus software.
- Conduct private business
privately. Do not access your sensitive credit card or bank accounts from
a free Wi-Fi access point. Do this business from your own secure network.
- Change your settings.
Change the settings of your device so that it does not automatically
connect to any nearby Wi-Fi network. This way you will be more aware of
what networks you are connected to.
- Turn off your wireless
network when you are not using it.
- Use encryption. Encryption
encodes transmitted data so that strangers cannot see what is transmitted.
Currently, there are two encryption protocols available to Wi-Fi networks:
Wired Equivalent Privacy (WEP) which is out of date and Wi-Fi Protected
Access (WPA) with WPA2 being the newest version of this protocol. Be sure
to use WPA2.
No comments:
Post a Comment