• Internet 17.10.2014 No Comments

    public wifi security

    These days, public Wi-Fi can be accessed from various places like public transport, restaurants, parks, coffee shops, and so on. But the question arises that are these free of cost public WiFi really safe?

    The truth is that Public WiFis aren’t safe at all but you can make them safe by changing few settings of your system and installing antivirus softwares. Moreover, the best practice to use wifi safely is to use VPN, a personal SSH access or a ip-hider software and encrypt the data traffic. The biggest security concern with public WiFi is that each time individuals make use of WiFi, they are actually opening doors to criminalpublic wifi not safe organizations and hackers who within seconds can access as well as steal private, financial, and personal information of yours. When using wifi offered for public, one is actually broadcasting their confidential and private information to all.

    A general misconception is there that wifi offered for public use by big organizations can be used safely but this is just not correct. There are several fraudsters who imitate different network names so that the other time when users are connecting to some public wifi in hotel or airport, these thieves can gain access to vital information of yours. This is the reason why big companies recommend making use of VPN strongly prior to connecting to wifi so as to make sure that you are having optimum protection. Fraudsters make use of fake wifi hotspots hence safe public wifi usage does not exist.

    There are several ways that can assist you in securing your device as well and a few of them are given below:

    • Wifi should be turned off when not in use. This helps in preventing the device from getting connected automatically to other WiFi networks running in your area.
    • Always change the MAC address of your device each time when you connect to public Wi-Fi hotspots to prevent yourself from being tracked by hackers or advertisers when you travel around.
    • Ensure you are visiting only those sites that make use of SSL. This can be detgoogle-ssl-httpsermined by seeing “https” in URL address of the website. Here, S means secured. So it will be better if you look for this https on each page that you are visiting and in case if it isn’t there, restrict yourself from visiting such pages until it is very urgent.
    • Don’t make use of public Wifi for accessing bank account, sending private or sensitive data, and shopping online.
    • Ensure that all data or information that you send over publicly available wifi is encrypted.

    Several tips about how to use wifi safely are given below:

    • Keep antivirus software in your device on when you are using public wifi. Antivirus doesn’t guarantee 100% protection but still they will keep some bit of unauthorized activities away from your device. Make sure your antivirus is up-to-date as this will provide you first alert in case security of your system or device is being hindered when you are connecting to some unsecured network. Alerts are also displayed when viruses get loaded on the device or some suspicious behaviour like changes to registry files are noticed. Antivirus won’t catch each and every unauthorized activity but will protect against most of those unauthorised attacks.

     

    • Firewall in your device should be turned on. Maximum operating systems come with in-built firewall that keeps in monitoring outgoing and incoming connections. Firewalls don’t offer complete protection but their settings must always be enabled. For activating firewall, simply go to Control panel in Windows OS and you will find firewall option under the System and Security option. All you need to do is click on Turn Windows Firewall On or Off. Now enter administrator password and verify that Windows Firewall has been activated. There are also many reliable third-party internet security suites that provide a integrated antivirus & firewall solution, Bitdefender, McAfee, and Norton internet security are among this.

     

    • Protect Password as it helps in securing your online transactions. Keep unique passwords for each account as it will help in securing other accounts in case one of the passwords is compromised. It can be tricky to remember multiple secure passwords so you can make use of password managers like LastPass or KeePass as these are secure and safe. These are free tools that store information in varywifi hotspot namesing ways. KeePass will maintain database file in encrypted form on your system whereas LastPass will store credentials of yours in cloud. But for this approach as well there are both advantages and disadvantages as these services aren’t complete safe and secure.

     

    • Confirm network name prior to logging on to some public network. There are times when hackers set fake Wi-fi networks for attracting public wifi users. For this they can give nearly matching name to a secured network. When users connect to that fake network they get into hands of these eavesdroppers. In case you aren’t sure about the network name, it is better asking the provider.

     

    • Make use of 2-factor authentication method. Here, 2 factor authentication method means public wifi users will require 2 piece of details for logging to their account. The first information will be something that they are aware of already whereas the other is something that they need to know. Often it takes the form of a password and code sent to mobile phone of users.

  • Mobile devices nowadays are facing array of threats taking advantage of several vulnerabilities found commonly in these devices. The main thing is that these vulnerabilities could be the result of technical controls that are not adequate. They can also be a result of consumers’ poor security practices. There are several relevant federal and private agencies that have taken vital steps towards enhancing mobile device security inclusive of making specific controls mandatory for the customers to use if they want as well as promulgating details about suggested mobile security practices. Give below is a list of problems due to which Mobile Security should be a concern now.

    Often mobile devices don’t have password enabled protection. There are several mobile devices lacking passwords for authenticating users as well as control access to information stored on devices. On the other hand, there are devices having technical ability of supporting passwords, pattern screen locks, and PIN (Personal Identification Numbers) for authentication. Some latest mobile devices come with biometric reader that can scan fingerprint for authentication. Anecdotal details suggest that mobile users are seldom employing these security checks. Moreover, if users are making use of PIN or password, they are using PINs or passwords that can easily be bypassed or determined, for instance passwords like 0000 or 1234. If devices are not locked with passwords or PINS, there is a risk for them to be lost or stolen and information on such phones can be accessed easily by users who aren’t authorized thereby leading to misuse of mobile devices or viewing of sensitive information.

    Always, 2-factor authentication isn’t used while carrying out sensitive transactions on these mobile devices. As per studies, users usually make use of static passwords rather than 2-factor authentication when it comes to carrying out sensitive online transactions with their mobile devices. Making use of static passwords primarily for authentication comes with security issues: unauthorized individuals or organizations can guess passwords, users can forget them, and passwords can get stolen, or can be eavesdropped. In general, 2-factor authentication offers high level of security when compared to conventional PINs and passwords. Further, this high level of security is exceptionally important for carrying out sensitive transactions. Here, 2-factor is authentication system wherein users have to authenticate by making use of 2 different “factors” at least of something they know, something they are, or something they possess prior to being granted access. As a second factor, one can use mobile devices in few of the 2-factor authentication systems. Mobile devices can easily generate codes or pass codes via sending text messages to phone. If 2-factor authentication isn’t there, risks are there that unauthorized users can misuse your mobile device or gain access to critical information.

    httpsAlways, wireless transmissions aren’t encrypted. Details like emails sent via mobile devices are not encrypted while they are being transmitted. Moreover, several applications don’t encrypt information that they receive or transmit over network thereby making it simpler for information to be intercepted. Let us consider an example. If some app transmits information over unencrypted WiFi network by making use of http instead of secure http, data can easily be intercepted. Similar is the case with wireless transmission when data isn’t encrypted.

    Mobile devices often contain malware. Mobile users download applications containing malware. Unknowingly this malware enters their device and it will be disguised in the form for utility, security patch, game, or some other important application. For users it is tough to explain difference between applications that are legitimate and those that contain malware. For instance, applications can be repackaged with malware as well as users can download them inadvertently onto their mobile device. Data can be intercepted easily. When wireless transmission isn’t encrypted, data can be intercepted easily by eavesdroppers who in turn can gain unauthorized access to critical information.

    mobile securityOften mobile devices don’t make use of security tools. There are several devices that don’t have preinstalled security tools for protecting themselves against spyware, malware, and malicious applications attacks. Moreover, users always don’t install security applications because some devices come with preloaded security softwares. These security tools can slow down operations as well as affect battery life; there are some mobile devices that can be at risk without these as attackers can distribute malware successfully, malwares like spam, spyware, and Trojans for luring users into revealing their confidential information like passwords.

    Mobile devices may have out-of-date Operating System. Security fixes or patches for OS of mobile devices aren’t installed always on mobile devices in timely manner. This can take nearly months prior to security updates being offered to devices of consumers. Based on the nature of vulnerability, patching process can be complex as well as involve several parties. For instance, Google keeps developing updates for fixing security vulnerabilities for Android OS but it depends on mobile manufacturers as to when to produce device-specific updates incorporating vulnerability fix that will take time if proprietary modifications are there to software of the device. As soon as updates are produced by manufacturers, it is up to every carrier to test those as well as transmit them to devices of consumers. In many cases, carriers can take time in offering updates as they require time in testing whether they are interfering with other device aspects or tools already installed on the device.

    appsApps or softwares installed on your mobile device can be outdated. For 3rd party apps, security patches aren’t always developed as well as released in timely manner. Additionally, 3rd party mobile apps including web browsers don’t notify consumers always for updates whenever they are available. Unlike conventional web browsers, even mobile browsers get updated rarely. Making use of tools that are outdated increase risk that is exploited by attackers.

    Often, mobile devices don’t limit internet connections. There are several devices that don’t have firewalls for limiting connections. When devices are connected to WAN, they make use of communications ports for connecting with internet and other devices. Hackers can easily access mobile device via port that isn’t secured. Firewall helps in securing these ports as well as allows users to select what connections they wish allowing to their device.

    Tags: , ,

  • Internet is being used widely in areas like education, research institutes, offices, and information centres. It is because of internet that efficiency and accuracy of work has become high. This in turn means saving manpower and money. Internet is a global network that connects millions of computers together. There are more than hundred countries linked to exchanging of news, opinions, and data. As per Internet World Stats, there are nearly 2,267,233,742 users of internet across the globe. Internet isn’t like online services that are controlled centrally instead it is decentralized in terms of design. Every internet system is called host and is independent. It depends on the operator as to which internet services they want to make use of.internet pros & cons

    Internet isn’t owned by a single organization or person. In fact it is controlled by number of organizations working simultaneously. It relies on physical infrastructure connecting one network to other networks. In simpler terms, internet can be defined as network or networks or networking infrastructure. Here, millions of systems will be connected together globally thereby forming network wherein one system can easily communicate with another system till both systems are connected to internet. Often individuals confuse internet with WWW (World Wide Web). Web or World Wide Web is way to access information over medium of internet. Given below are some pros and cons of internet that will help you in determining whether internet is really making our lives better or worse.

    Internet advantages

    Emails – Email is online correspondence system. Through emails, one can receive and send electronic messages instantly that works just like sending letters. Message of the sender will be delivered to recipient instantly irrespective of in which part of the world both sender and receiver are located. It is a huge time saving method.

    internet advantagesShopping – In addition to getting information, one can shop online using internet. Several websites and shopping portals are there that you can choose to buy products with the help of your shopping cards. It can be done from comfort of home hence saving money and time.

    Access Information – Internet virtually is a treasure box of information. You will get all kind of information no matter which topic you search. There are several search engines for making your life easier.

    Online Chatting – You will come across several chat rooms on internet where you can make friends, meet new people, and find your old friends.

    Software Downloading – Internet allows you to download various tools, movies, games, music, applications, videos, and much more with just click of a button.

    Disadvantages of Internet

    Pornography – It is a pretty serious issue concerning internet primarily associated with children. Thousands of pornographic websites are there on internet that isn’t recommended for people.internet disadvantages

    Personal Information Leak – Internet is being used for wide range of information sharing be it through online transfer or through social networking sites. There are people or hackers who are stealing your personal details and using them incorrectly.

    Virus And Malware – These are internet infections which are highly common. These viruses infect your system as a result of which you face issues like tracking, system crashing, information stealing, and lots more.

     

    Read More – Lastest News

    Tags: , , ,