Jakarta –
Do not use it carefully WiFi which is outside, also includes WiFi which you don’t know if it is official from the airport or not. If you pay attention to it, the risk of theft of personal data (which is unlikely to lead to the theft of money in your account) may disappear.
The activities of the ‘bad couple’ have been threatening for the last few years. Bad connection Yes a method of installing fake WiFi networks by hackers or groups of hackers, usually in public, so that they can attract many victims.
There is an example of this, detikers. An Australian man has been accused of carrying out WiFi attacks on domestic flights and airports in Perth, Melbourne and Adelaide. He allegedly created a fake WiFi network to steal email or social media credentials.
SEVENTEEN
CHECK TO CONTINUE WITH INDEX
“As the general public becomes more accustomed to free WiFi everywhere, you can expect malicious peer-to-peer attacks to become more common,” said Matt Radolec of data security firm Varonis.
“It’s almost like a game to see how quickly you can click ‘accept’ and then ‘submit’ or ‘connect’. This is a trick, especially when they will visit new places; users may not even know what a legitimate site looks like when they are faced with a fake site,” he explained.
As technology improves, a bad pair is now much easier to hide. A bad connection can be a small tool and put away somewhere.
“Such devices can provide copies of legitimate login pages, which invite users of unattended devices to enter their usernames and passwords, which are then collection for future use,” said Cincinnati-based IT consultant Brian Alcorn.
The site doesn’t even require you to log in. Once you enter your information, it’s all set. After the hacker receives the credentials, the information can be fed into the AI. They can also quickly hand over the keys to cybercriminals. This is a disaster, especially for people whose passwords are easy to guess.
“You’re vulnerable with someone with less than USD 500 in equipment and less skills than you might think. An attacker only needs basic IT skills,” said Alcorn.
So, how do you spot bad link attacks? Brian Callahan Director of the Rensselaer Cybersecurity Collaborative at Rensselaer Polytechnic Institute recommends using a hotspot from your own mobile phone.
“You know the name of the network from the moment you create it, and you can enter a strong password that only you know to connect to,” Callahan said.
If hotspots are not an option, VPNs can also provide protection. This is because traffic to and from the VPN must be encrypted.
“So even if other people can see the data, they can’t do anything about it,” he concluded.
(ask/ask)
2024-10-19 05:01:00
#WiFi #airport #money #run