Tech 21 Century

  • About
  • MY BOOKS
  • Home
  • Electronics
    • Apple Products
    • Gadgets
    • Mobile Phones
  • General Tech
    • Tech News
    • Smart Home Tech
    • Technology Certifications
    • VoIP
    • Web Hosting
  • Software
    • Windows
    • Mobile Apps
    • Software Product Reviews
    • Top Software Products
    • Video Conversion Software
  • Product Reviews
    • Computers and Peripherals
    • Home Routers and Modems
    • Mesh WiFi
    • Smart Home
    • VPN
  • Security
  • Computers
  • Gaming
  • Internet
  • Video Streaming
You are here: Home / Security / Be careful when using public Wi-Fi Hotspots
I may earn a small commission if you buy through the links in this website without any extra cost to you. My Recommendations however are not biased in any way.

Be careful when using public Wi-Fi Hotspots

According to the findings of a global survey from Online Security Brand Tracker, conducted on behalf of ESET (April-May 2011), nearly 50% of Internet users are using portable devices as their primary connection. The most popular devices used for Internet connectivity are notebooks (41%), followed by netbooks (3%), smartphones (2%) and tablets (1%).

When you’re in an airport, you open your laptop to read or send e-mails, looking for a free Wi-Fi hotspot. And there it is! You almost always find one and connect to send and read your e-mails etc. What you do not take into consideration is that the free Wi-Fi may have a privacy cost associated with it: the data of your connection, your personal details and other important information can be stolen when you send your message, without having any idea that such a thing could happen. Before you know it, you’re calling Lifelock for identity theft protection because your personal information has been stolen, and soon, your identity.

What should make you suspicious is when there is a Wi-Fi hotspot with a name that is not recognized or resembles an official or even a celebrity name. Also, the user must be particularly cautious in hotspots that do not need password protection for access. The ‘magic’ of the data theft happens through a proxy technology, which monitors the Wi-Fi communication and captures and stores a copy of all your data on the hacker’s laptop. This process will slow down the traffic speed of your connection but in cases of networks with many users it is difficult to say with certainty whether the slow traffic is due to the theft of your data or because there are many users connected simultaneously.

Each time the user performs a task on the internet, whether buying staff online, checking your bank account or checking of email, the computer must send the login to the network, which is a goldmine for fraudsters on the internet. Under normal conditions the connection to a secure site (such as your bank site) must start with “https” instead of “http“, which means that traffic is encrypted. Some sophisticated hackers can even steal your encrypted communication (by proxying your connections through their own computer). For this reason, extreme caution is required when giving personal information and passwords in a public WiFi hotspot.

The threats to be aware while using public Wi-Fi:

  • Evil twin login interception: networks set up by hackers to resemble legitimate Wi-Fi hotspots.
  • 0-day OS / app attack attempts: attacking your computer and applications in order to get access to it using unknown and unpatched vulnerabilities.
  • Sniffing: software or hardware that can capture and record the traffic passing over a network.
  • Data leakage (man-in-the-middle attack): Cyber-criminals who can modify network traffic, leaving the impression that the user navigates the website of a bank for instance, while, in reality, traffic is passed first through the attacker’s computer.
Spread the love

Related Posts

  • The Hacker Next Door: Unraveling the Unexpected Human Side of Cybercrime
  • Here are the Main Pros and Cons of Cyber Security for Businesses
  • The Importance of Strong Passwords in Information Security
  • The 15 Best Cloud Based Security Solutions for Businesses (SMB or Large Enterprise)
  • Different Types of WiFi Security Standards for Your Network

Filed Under: Security

About Harris Andrea

Harris Andrea is an IT professional with more than 2 decades of experience in the technology field. He has worked in a diverse range of companies including software and systems integrators, computer networking firms etc. Currently he is employed in a large Internet Service Provider. He holds several professional certifications including Cisco CCNA, CCNP and EC-Council's CEH and ECSA security certifications. Harris is also the author of 2 technology books which are available at Amazon here.

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Search this Site

Copyright © 2026 | Contact | Privacy Policy & Disclaimers | Amazon Affiliate Disclaimer | Terms of Service