Public wifi

Page 1

Public Wifi


Study commissioned by the Public Communications Department (DPC) and the National Coordinator for Counter-terrorism and Security (NCTV).


Dutch careless with computers, public wi-fi Posted on Oct 28, 2014 by Janene Van Jaarsveldt Dutch people are careless when using a work laptop, tablet or smartphone on a public WiFi network. Many people seem unaware of the risks. One in three employees even sometimes leave their device unattended. This is evident from a study commissioned by the Public Communications Department (DPC) and the National Coordinator for Counter-terrorism and Security (NCTV). Other people can access your device when you are using a public WiFi network. If malicious parties are able to obtain passwords, they can log on to companies’ systems and get hold of sensitive information. Only a small percent change passwords after using a public WiFi network.

The study also shows that people protect their personal computers better than they do their tablets and smartphones. People also seem to be very careful on social media like Facebook and Twitter. They pay close attention to who can see what they post.

http://www.nltimes.nl/2014/10/28/dutch-careless-computers-public-wi-fi/


The easiest way to eavesdrop and wiretap internet connections is via wifi hotspots. Public wifi security in most public wifi hotspots that you find in cafes, coffee shops, airports, schools and hotels is non-existent. As they are lacking public wifi security encryption, they tend to be completely open and insecure. People believe that public wifi hotspots are secure since they are offered from established, successful businesses. However, even the largest and most secure businesses may have security breaches. Public wifi security is in its infancy!


Stealing your data! Very easy. In fact, you can download the software and use it yourself. Please visit FaceNiff, Firesheep, Ethereal and Wireshark to begin eavesdropping. Please keep in mind, eavesdropping and data snooping may be highly illegal in the UK. However, criminals do not care. In fact, most of them will never be caught since it is very hard to prove a crime was committed.


Two methods of watching wifi traffic: Scanning/Snooping - Hotspot


http://www.wifihotspotcreator.com/



Edward Snowden



No User Data Stored: StartPage and Ixquick never store user data, including IP addresses and search queries, so government agencies have no incentive to ask for these. This privacy is so complete; the company doesn't even know who its customers are, so it can't share anything with Big Brother. • Encrypted (HTTPS) Connections: StartPage and Ixquick were the first search engines to use automatic encryption on all connections to prevent snooping. When searches are encrypted, third parties like ISPs and the NSA can't eavesdrop on Internet connections to see what people are searching for. • Not Under U.S. Jurisdiction: StartPage and Ixquick are based in the Netherlands, so they are not directly subject to U.S. regulations, warrants, or court orders. They can't be forced to participate in spying programs like PRISM. The company has never turned over a single bit of user data to any government entity in the 14 years it has been in business, which is not surprising since there is no data in the first place.


Keeping Safe


• Be careful to connect to the correct network • Turn on the Firewall • Avoid file sharing • Disconnect when not in use • DO NOT make any Financial Transactions • Use a VPN

• Change Passwords Frequently • Update, Update, Update! • DO NOT keep copies of driver licences, passports, HMRC on your computer and never name them what they are. • Secure your web based mail! Via https!


• Turn off sharing • Use two factor authentication Don’t forget the physical Laptops and tablets are convenient because they’re portable. And because they’re portable, they are also easily stolen. Unfortunately it only takes a few seconds for an unattended and un-watched laptop to disappear.


As I said, it can be safe to use open Wi-Fi, but it’s also very easy for it to be unsafe… Your Mobile Carrier may offer one of the following that will save you from the dreaded public wifi!! Use your mobile device. Many phones or other mobile devices, such as iPhones, iPads, Droids, Blackberrys and others, are quite capable email and web-surfing devices, and typically do so via the mobile network. (Some can also use Wi-Fi, so be certain that you’re using the mobile broadband connection for this option to avoid the very security issues that we’re discussing.) Tether your phone. Tethering means you connect your phone to your computer – usually by a USB cable, but in some cases, via a Bluetooth connection – and the phone acts as a modem, providing a mobile broadband internet connection.

Use a dedicated mobile modem. Occasionally referred to as “air cards”, these are USB devices that attach to your computer and act as a modem, providing a mobile broadband internet connection, much like tethering your phone. Use a mobile hotspot. In lieu of tethering, many phones now have the ability to act as a Wi-Fi hotspot themselves. There are also dedicated devices, such as the MiFi, that when turned on, are simple dedicated hotspots. Either way, the device connects to the mobile broadband network and provides a Wi-Fi hotspot accessible to one or more devices within range. When used in this manner, these devices are acting as routers and must be configured securely, including applying a WPA/WPA2 password so as not to be simply another open Wi-Fi hotspot susceptible to hacking.


Data Leakages:


Wi-Fi gives us freedom from wires, but it’s not secure by default. Data is transmitted through the air, and anyone nearby can easily capture it with the right tools. As discussed today, whether you have your own Wi-Fi network or use someone else’s, employing security measures is necessary to protect files, online accounts, and user privacy. Don’t forget the rest of your tools.


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.