Meter.net News Where is the real threat to you when you connect to public Wi-Fi?

Where is the real threat to you when you connect to public Wi-Fi?

You sit in a cafe, connect to a public Wi-Fi network, and start working on your business. Everything from emails to payments. Are your data and passwords safe during these activities? Take a look at the possible risks and some tips on how to avoid them wisely. our privacy is not nearly as protected as it may seem with a cup of good coffee.

Robbery as a piece of cake

The number of places with free Wi-Fi is constantly growing. Cafes, restaurants, hotels, airports and even the means of transport themselves. We meet the inscription FREE Wi-Fi in public space very often, not only in our country, but also abroad. You can either connect immediately, or you can find out the password by simply asking the staff. Be aware that not only you but also malicious people can connect to a public and unprotected Wi-Fi network.

t is relatively easy for hackers and attackers to eavesdrop on all communications. In fact, all they need is a cheap device and software downloaded from the Internet. Are you still calm? A list of information that a clever attacker can steal in a few minutes will change your attitude. Many experiments directed by technology servers and prestigious media confirm that it is not a problem to get:

  • Device and operating system information
  • Internet service and email passwords
  • Message content including chat
  • Information about social media activities
  • Search queries
  • Browsing history
  • Login cookies

The result is a loss of privacy and a high risk of your data being misused. A complete stranger can log in to your mailbox and start sending messages. To his superior, clients, family members. He will change your password. He knows what you're looking for. Can you defend yourself?

Basic rules for safe surfing

Of course, not every public Wi-Fi is eavesdropped on by a scoundrel. However, this fact should not be enough for you not to be careful. Use your common sense as a minimum. Preventing and following a few basic rules will save you a lot of troubles.

Don't connect to public Wi-Fi if it isn't necessary. Mobile internet offers you a higher degree of protection. Try to schedule important activities for a private connection.

Distinguish what you do on Wi-Fi. Logging in, paying and entering personal data is risky. Of course, looking for the weather forecast or timetables on public Wi-Fi is a risk with only a great deal of imagination.

Don't underestimate multiphase security. Banks and payment gateways know very well why you have to confirm the payment with an SMS code. Many Internet services today allow you to link an account to an alternate email address or phone number.Even if an attacker obtains the password, he will not be able to change it. Google can even alert you when someone from another site connects to your account.

Turn off Wi-Fi when you're not using it on your device. First of all, you will save battery power, and secondly, you will have full control over which network you connect to. We also recommend turn off the function of automatic connection and sharing.

A good protection against eavesdropping is to use a VPN connection. There are a number of VPN services and mobile applications that allow you to use encrypted connections. Their setup is not complicated, in addition, many users already know the VPN, for example from work or school. On the contrary, try to avoid free VPNs. Again, you can't be sure that it's not managed by someone who grinds his teeth on your data.

What does the green lock in front of the address mean?

You may have noticed a green lock in front of the address in your web browser. This symbolizes that the site has the HTTPS protocol. In this case, the communication between you and the website is encrypted. The data you're sending off, including the login data, should not be deciphered by a less experienced hacker.

Most large sites and services use the HTTPS protocol. We expected another increase in 2017, as Google has chosen to favour sites that protect its visitors in search results. It is in the interest of every operator to deploy the HTTPS protocol on the web.

Unfortunately, even the encrypted communication does not offer 100% protection. It should be borne in mind that the attacker is often one step ahead. He is the one who can push you for a fake certificate. It is always good too to click on the details in the browser and find out who the certificate is registered for. The subject should be identical to the site operator.

Carefulness is important

The existence of public Wi-Fi is justified. However, they are definitely not designated for you to deal with important work tasks, payments via online banking and private matters. If you are not careful enough, the risk of abuse is real.The fact that you have not been the victim of any attack in the past means nothing in this case. Be careful, prefer sites with HTTPS and do not hesitate to use virtual private networks. When you are logging in to the bank or paying online, check the URL address and look at the detail of the certificate. As a regular user, these are the best steps you can take to protect your privacy.

The Internet of Things is one of the current phenomena in the field of IT and the Internet. Read how to use the Internet of Things (IoT) in your home and what to look out when you are using it.

If you want to connect your computer to the Internet or your home network with a cable, you have two options. You can either buy an already finished cable with connectors in the required length in the store, or you can make it yourself. The home production of the network cable is necessary especially if you need to pass it through a narrow hole into which the connector doesn't fit. You usually have to install it after passing the cable through a small hole. Read how to make such a cable and how to repair that current one.

A purchase of a router is waiting for you, but when you look at the offer, you only see boxes that differ in price and appearance? In that case, a basic overview of important parameters can not only save you a lot of money, but also significantly speed up the Internet.

The use of switches (network switches) is currently the prerogative of company networks in particular, but they are also used in home networks. In the market you will find switches in various price categories, which differ in parameters and additional functions. What to focus on and how to choose a new switch? This is the issue to what we will apply in the following lines.

When you have a fast connection, but there are significant speed fluctuations, something is probably wrong. It is a question, where to start looking. Basically, you should first verify if the connection really offers the speed which you have agreed with the provider in the contract. The problems can also be caused by a large number of running applications, it is necessary to check it and possibly leave only those one that you are currently using. Then check the aggregation and after that the router.