Search
Close this search box.
Blog » Business Tips » 12 Reasons You Should NEVER Use the Public Wi-Fi

12 Reasons You Should NEVER Use the Public Wi-Fi

Public Wifi

Cybersecurity is a major concern. If organizations like the the U.S. Department of Justice and Snapchat can have security breaches then what’s to stop an attack against you?

In most cases, you are are safe if you follow security practices like using anti-virus software, being aware of the risks that scammers pose, and staying on your own secure server.

However, what do you do when you have to travel? There’s a good chance that you’ll have to rely on public W-Fi, and as you will see, that’s not exactly a great idea.

1. Man-in-the-middle

One of the most common types of Wi-Fi security threats are man-in-the-middle (MitM or MiM) attacks. This is where hackers intercepts data through techniques like eavesdropping. Here attackers will intercept and relay messages between two different parties. This makes it appear as though everything is normal, but in reality, the attacker is controlling the entire communication.

For instance, during a MitM attack, when you login into your bank account that information is actually being sent to the attacker, as opposed to your banking institution.

If your screen is jumping around sometimes this is a clue. If your computer is doing things it normally doesn’t — check it out before proceeding.

2. Attack of the clones

Another common trick for hackers is to divert your internet traffic to a cloned site. This is known as DNS spoofing and can easily trick users into logging into a seeming legit site. Without being aware, you’ve just willingly handed over your login information to an attacker.

3. One password to rule them, rule

It’s pretty common for us to use the same email address for all of online needs. This creates a problem because a hacker simply has to steal your email address and password whenever you sign in on a public WiFi network.

With that info they can request lost passwords from the websites you visit, which in turn will now be sent to the inbox that is in the hands of the hacker. Some hackers merely use a type of Bcc to themselves — until something wonderful comes down your pipeline that is useful to them.

4. Other users may be infected

Let’s say that you’re doing some work at your local coffee shop, but another patron doesn’t have any type of malware protection. They just put your device in danger through something called worms. This is basically when a virus jumps from one device to another. Worse than a cold.

5. Criminal activity

Another hacker trick is the ability to change specific words or pictures on a website. That may not seem like that big of a deal, just a minor inconvenience, but as Wouter Slotboom, an “ethical hacker” explained to Medium, this means that a nefarious individual could do something like load child pornography onto your smartphone. Needless to say, that’s a serious crime.

This sort of activity leaves a print so that you will receive “customized feeds for better user experience” from some truly awful places.

6. Rogue Wi-Fi networks

When you connect to a WiFi connection that is listed as, “Free Public WiFi” in places like a park or airport, hackers are waiting to gain unauthorized access to your information because these networks look legit. When you login into these fake networks, hackers now have access to your sensitive data.

7. Rogue access points

Rogue access points are just access points installed on a preexisting network. These are frequently found with wireless routers where a well-meaning employee installs a router in order for customers to access to the Wi-Fi network.

Unfortunately, most of these networks aren’t configured properly because they aren’t encrypted, for example. This makes it pretty easy for hackers to break into.

8. Endpoint attacks

Endpoints were commonly a “device or node that is connected to the LAN or WAN and accepts communications back and forth across the network,” such as modem or switch.

More recently, “endpoint is used most commonly in network security and end user mobility circles to mean any device outside the corporate firewall.” So, when you go outside of your firewall, hackers can build fake websites or landing pages, which allows them access to the entire network.

9. Shoulder surfing

Hackers can even go old school with their attacks. They just set-up shop somewhere in public and look over your shoulder so that they can steal your login information. It may not be that common, but it’s definitely an overlooked tactic since there’s so much focus on cyber-protection.

Remember, back to the wall and back not in front of a window on the ground floor. Sorry to sound so, “cloak and dagger.”

10. Free Wi-Fi isn’t secure

There are plenty of free WiFi networks — yes, even at your favorite coffee shop — that don’t use leading encryption technology.

The reason? It’s expensive to have a secure network. Even though there are good in intentions, they are unwittingly putting their customers in harm’s way.

11. Mobile apps aren’t that secure, either

Since we’ve pretty much gone mobile, we’re spending more and more time using apps.

Here’s the problem. Some of us don’t have antivirus software on our mobile devices. And, buggy apps that haven’t been coded properly can be more prone to attacks.

12. Human error

Humans make mistakes. No matter how diligent you are about protecting your data it’s easy to have a slip-up here and there. For example, you may be in a rush to get to a meeting on-time or catch a flight.

Instead of setting public connections to “Public,” you set a public Wi-Fi hotspot to Home or Work as the network type. Hacker now have access to documents and files on your device.

 

How to keep yourself protected

What if you’re in a situation when you do have to use public Wi-Fi? Here are a couple of precautions that you can take.

  • Use a VPN (virtual private network). If not available, look for SSL connections.
  • Keep your antivirus programs up to date and running.
  • Keep Wi-Fi off when it’s not being used.
  • Ask for the network name from the business in order to avoid scam networks.
  • Turn off sharing.
  • Be aware of the sites you visit. Avoid logging into banking sites or social networks when on a public network.
  • Don’t click on links from within an email or website you don’t trust, or from a site you don’t know.
  • Be aware of your surroundings. Don’t login into a site if there are too many people around.
  • Be aware that hackers will keep getting smarter and more skilled, so stay up-to-date on cybersecurity and the new ways that will be developed in order to keep you and your systems safe.

About Due’s Editorial Process

We uphold a strict editorial policy that focuses on factual accuracy, relevance, and impartiality. Our content, created by leading finance and industry experts, is reviewed by a team of seasoned editors to ensure compliance with the highest standards in reporting and publishing.

TAGS
CEO at Due
John Rampton is an entrepreneur and connector. When he was 23 years old, while attending the University of Utah, he was hurt in a construction accident. His leg was snapped in half. He was told by 13 doctors he would never walk again. Over the next 12 months, he had several surgeries, stem cell injections and learned how to walk again. During this time, he studied and mastered how to make money work for you, not against you. He has since taught thousands through books, courses and written over 5000 articles online about finance, entrepreneurship and productivity. He has been recognized as the Top Online Influencers in the World by Entrepreneur Magazine and Finance Expert by Time. He is the Founder and CEO of Due.

About Due

Due makes it easier to retire on your terms. We give you a realistic view on exactly where you’re at financially so when you retire you know how much money you’ll get each month. Get started today.

Categories

Top Trending Posts

Due Fact-Checking Standards and Processes

To ensure we’re putting out the highest content standards, we sought out the help of certified financial experts and accredited individuals to verify our advice. We also rely on them for the most up to date information and data to make sure our in-depth research has the facts right, for today… Not yesterday. Our financial expert review board allows our readers to not only trust the information they are reading but to act on it as well. Most of our authors are CFP (Certified Financial Planners) or CRPC (Chartered Retirement Planning Counselor) certified and all have college degrees. Learn more about annuities, retirement advice and take the correct steps towards financial freedom and knowing exactly where you stand today. Learn everything about our top-notch financial expert reviews below… Learn More