Meter.net News Where is the real threat to you when you connect to public Wi-Fi?

Where is the real threat to you when you connect to public Wi-Fi?

You sit in a cafe, connect to a public Wi-Fi network, and start working on your business. Everything from emails to payments. Are your data and passwords safe during these activities? Take a look at the possible risks and some tips on how to avoid them wisely. our privacy is not nearly as protected as it may seem with a cup of good coffee.

Robbery as a piece of cake

The number of places with free Wi-Fi is constantly growing. Cafes, restaurants, hotels, airports and even the means of transport themselves. We meet the inscription FREE Wi-Fi in public space very often, not only in our country, but also abroad. You can either connect immediately, or you can find out the password by simply asking the staff. Be aware that not only you but also malicious people can connect to a public and unprotected Wi-Fi network.

t is relatively easy for hackers and attackers to eavesdrop on all communications. In fact, all they need is a cheap device and software downloaded from the Internet. Are you still calm? A list of information that a clever attacker can steal in a few minutes will change your attitude. Many experiments directed by technology servers and prestigious media confirm that it is not a problem to get:

  • Device and operating system information
  • Internet service and email passwords
  • Message content including chat
  • Information about social media activities
  • Search queries
  • Browsing history
  • Login cookies

The result is a loss of privacy and a high risk of your data being misused. A complete stranger can log in to your mailbox and start sending messages. To his superior, clients, family members. He will change your password. He knows what you're looking for. Can you defend yourself?

Basic rules for safe surfing

Of course, not every public Wi-Fi is eavesdropped on by a scoundrel. However, this fact should not be enough for you not to be careful. Use your common sense as a minimum. Preventing and following a few basic rules will save you a lot of troubles.

Don't connect to public Wi-Fi if it isn't necessary. Mobile internet offers you a higher degree of protection. Try to schedule important activities for a private connection.

Distinguish what you do on Wi-Fi. Logging in, paying and entering personal data is risky. Of course, looking for the weather forecast or timetables on public Wi-Fi is a risk with only a great deal of imagination.

Don't underestimate multiphase security. Banks and payment gateways know very well why you have to confirm the payment with an SMS code. Many Internet services today allow you to link an account to an alternate email address or phone number.Even if an attacker obtains the password, he will not be able to change it. Google can even alert you when someone from another site connects to your account.

Turn off Wi-Fi when you're not using it on your device. First of all, you will save battery power, and secondly, you will have full control over which network you connect to. We also recommend turn off the function of automatic connection and sharing.

A good protection against eavesdropping is to use a VPN connection. There are a number of VPN services and mobile applications that allow you to use encrypted connections. Their setup is not complicated, in addition, many users already know the VPN, for example from work or school. On the contrary, try to avoid free VPNs. Again, you can't be sure that it's not managed by someone who grinds his teeth on your data.

What does the green lock in front of the address mean?

You may have noticed a green lock in front of the address in your web browser. This symbolizes that the site has the HTTPS protocol. In this case, the communication between you and the website is encrypted. The data you're sending off, including the login data, should not be deciphered by a less experienced hacker.

Most large sites and services use the HTTPS protocol. We expected another increase in 2017, as Google has chosen to favour sites that protect its visitors in search results. It is in the interest of every operator to deploy the HTTPS protocol on the web.

Unfortunately, even the encrypted communication does not offer 100% protection. It should be borne in mind that the attacker is often one step ahead. He is the one who can push you for a fake certificate. It is always good too to click on the details in the browser and find out who the certificate is registered for. The subject should be identical to the site operator.

Carefulness is important

The existence of public Wi-Fi is justified. However, they are definitely not designated for you to deal with important work tasks, payments via online banking and private matters. If you are not careful enough, the risk of abuse is real.The fact that you have not been the victim of any attack in the past means nothing in this case. Be careful, prefer sites with HTTPS and do not hesitate to use virtual private networks. When you are logging in to the bank or paying online, check the URL address and look at the detail of the certificate. As a regular user, these are the best steps you can take to protect your privacy.

Today's home Wi-Fi network is under increasing pressure. It has to handle video calls, online gaming, and dozens of smart devices. The new Wi-Fi 7 standard offers a solution that takes wireless connectivity to the next level. We'll explain what this standard means in practice and why it might be crucial for the future of home and business networks.

When you type a website address into the browser, the correct page loads in an instant. This is managed by the DNS system, without which the internet as we know it would not exist at all. In this article, you will learn what DNS is, how it works, what types of records it contains, and why it is important for both speed and security of the connection.

Fast and stable connection is a basic necessity in every household today. The solution is fiber optic internet, which works differently than regular cables and offers greater reliability to users. We'll explain how this technology works in practice, what it entails to run a fiber optic cable to your home, and what equipment you’ll need to keep everything running smoothly.

Cloud gaming allows you to play games from anywhere without the need for expensive hardware. In this article, you'll learn how game streaming works, what advantages and limitations it brings, and which services are leading the way today. And most importantly: can it really threaten traditional consoles?

Brain microchips already allow controlling a computer with mere thoughts. In the article, you will learn how they work, what they have brought to the first users, and what promises scientists and Elon Musk associate with them. Along with hopes, questions about safety, ethics, and where this technology might take us also arise.

Mobile data usage can sometimes be unpleasantly surprising. The most are consumed by video streaming and music services – how much data does YouTube, Netflix or Spotify use? And what about other apps like social networks, maps or video calls? Check out the overview of the biggest data guzzlers and find out how to keep mobile data under control.

Other language versions