iStock_000026630984XSmall

Free Wi-Fi Hotspots – A Risky Luxury

Dec 04, 2013 By Sharon Solomon

The wireless revolution has turned internet access into a basic necessity. Social media networking and entertainment on-the-go are in high demand. In this reality, Wi-Fi hotspots are seen as blessings, even when the signal is coming from an unknown source. But this is a huge security risk that people rarely take into consideration.

The habit of searching for free wireless hotspots is very common amongst youngsters, businessmen with laptops and even casual tablet-users at home. The risk of getting hacked is very high once the attacker is locked onto your system. Unfortunately, most people can’t resist the urge to use unknown networks and sacrifice security.

Wireless Network Analyzers, available via multiple software vendors in the market, can easily trap Wi-Fi signals. Also known as 802.11 packets, these signals simply appear on the hacker’s laptop screen in real time. Passwords, personal information and instant messaging conversations can be easily intercepted.

Advanced hackers can take it one step ahead with the private information they trap during your Wi-Fi sessions. They can use sophisticated software to take control of your device remotely, install malware and eventually compromise your entire network. This can lead to serious security breaches in businesses and organizations.

Firewalls are a safety precaution all must implement on their laptops and mobile devices. Windows and Mac have built-in firewall features, but it’s always recommended to install good third party software. File Sharing should be off at all times and only secure websites should be trusted during important browsing sessions.

Your private LAN network is also highly vulnerable due to poor built-in encryption standards. Here are a few tips to secure your Wi-Fi network:

  • Every wireless LAN comes with a Service Set Identifier (SSID). It’s very important to change the SSID from its factory setting and also turn off SSID broadcasting.
  • Even people with strong passwords are advised to change their network access parameters every few months to keep the hackers at bay.
  • Denial-of-Service (DoS) attacks exploit inadequate bandwidth allocations on wireless LAN’s. Administrators must ensure proper bandwidth distribution to provide fair access.

The wireless technology revolution has changed our lifestyles drastically. But one must not ignore the huge security risks and vulnerabilities that come with this technological luxury. Until the wireless security standards reach adequate levels, it’s highly recommended you employ safe wireless web and computing practices.

Source – Top 10 Vulnerabilities In Today’s Wi-Fi Networks

The following two tabs change content below.

Sharon Solomon

Stay Connected

Sign up today & never miss an update from the Checkmarx blog

Get a Checkmarx Free Demo Now

Interested in trying CxSAST on your own code? You can now use Checkmarx's solution to scan uncompiled / unbuilt source code in 18 coding and scripting languages and identify the vulnerable lines of code. CxSAST will even find the best-fix locations for you and suggest the best remediation techniques. Sign up for your FREE trial now.

Checkmarx is now offering you the opportunity to see how CxSAST identifies application-layer vulnerabilities in real-time. Our in-house security experts will run the scan and demonstrate how the solution's queries can be tweaked as per your specific needs and requirements. Fill in your details and we'll schedule a FREE live demo with you.