©2021 Reporters Post24. All Rights Reserved.
How often do you connect to public Wi-Fi when you’re out and about? Consider it – this includes anywhere that’s not your private home network such as coffee shops, airports, public transport or the local pub. With the rise of the necessity to scan QR code menus, Apple Pay and mobile ordering, most venues are expected to provide Wi-Fi connection for basic business functionality.
Research from NordVPN has found that 41% of Brits use unsecured public Wi-Fi if given the opportunity, despite 52% of us believing they were most at risk of a cyber attack when connecting to public Wi-Fi in hospitality settings and on public transport. Although connecting to public Wi-Fi is convenient and sometimes necessary, dangerous cybercriminals are relying on this broadly blasé attitude around public Wi-Fi usage to infiltrate your devices and vital accounts.
Marijus Briedis, Chief Technology Officer at NordVPN, notes that “convenience coupled with our love of using devices on the go means public Wi-Fi connections have flourished”, although he reiterates that people are “right to be cautious about using them”.
“Hackers are opportunists at heart, so it’s understandable that some of the busiest venues like pubs and restaurants are those where people feel most nervous of logging on. The scope of threats varies from place to place but modern methods of hacking mean that even at work or in the security of our own home, we can still be at risk.
“Cyber awareness is important, and it’s good to see people erring on the side of safety when using public connections, whether it’s avoiding accessing sensitive information or clicking on pop-up ads. However, criminals still thrive on human errors, so technological solutions are a key backup that help to minimize risks,” he adds.
THE CYBER RISKS OF USING PUBLIC WI-FI
While connecting to public Wi-Fi is convenient and sometimes necessary for functions such as QR code menu scanning or mobile payments, cybercriminals are able to use lax security measures to infiltrate your devices and accounts.
Concerningly, hackers can access your information and logins even when entered on a secure site, as well as being able to use public Wi-Fi to deposit malware onto your device.
HACKERS STEALING YOUR DATA
A new kind of cyberattack called ‘WiKI-Eve’ was discovered in September 2023. WiKI-Eve was found to have been able to steal multiple passwords over Wi-Fi transmitted by most modern routers built since 2013. It is able to do this by exploiting a vulnerability in something called beamforming feedback information (BFI) technology that is present on all routers that have introduced 802.11ac, also known as ‘Wi-Fi 5’, which is the majority of routers!
WiKI-Eve attacks have been found to be able to achieve a whopping 88.9% inference accuracy for individual keystrokes and up to 65.8% top-10 accuracy for stealing passwords of mobile applications. These attacks can be carried out semi-easily by experienced cybercriminals who are able to launch the attacks from devices as small as a mobile phone that supports monitor mode.
In a demonstration of the vulnerabilities, the researchers investigating the WiKI-Eve cyber attack were able to set up a real-world case study where they are able to access a consenting victim’s WeChat Pay information by only using an iPhone, accessing compromised credentials and information about digital payments.
This password-stealing ability is made even more concerning when considering the password hygiene of the average person. In a recent study, SafetyDetectives found that 13 out of 30 of the most commonly used passwords feature only numbers, stating that “numeric patterns are worldwide favorite”. To make matters worse, when cybersecurity company Bitwarden surveyed 800 IT decision-makers from the UK and the US, it discovered that 90% of users reused passwords in the workplace. Many opted for simple, easy to remember, and therefore easy to guess, passwords such as “password”, or “12345678”. Others used the same passwords across multiple services, shared them with their friends and family, or wrote them down somewhere physically such as a post it note on a desk.
Of those questioned, 54% of respondents managed passwords with documents on their computer whilst 45% tried to simply memorize login credentials. When investigating workplace password sharing habits, Bitwarden found that security measures were severely lacking, with 38% of respondents using shared online documents, while 41% simply sharing the passwords via email.
With this epidemic of bad password practices, cybercriminals only have to exploit the vulnerability of one initial account to be able to access multiple and thereby cause incredibly impactful damage across all associated devices and logins.
CYBERCRIMINALS INFECTING YOUR DEVICE WITH MALWARE
Cybercriminals can use vulnerabilities in public Wi-Fi to infect your device with dangerous malware. If a malicious actor connects their device to the same public network as you, they can use Address Resolution Protocol (ARP) poisoning to gain access to your data. By utilizing specialist tool, they can scan the public Wi-Fi network for your device’s unique IP address as well as the main Wi-Fi router. They then send out fake ARP messages,to reveal the MAC (Media Access Control) address of both your device and the router. With these key pieces of information the hacker can impersonate your device and receive all the data that is transferred between you and the websites you visit, even if they are “secure”. This is a common hacking method known as ARP spoofing.
They can also use a technique known as ‘DNS poisoning’ or ‘DNS spoofing’. DNS servers translate website names that you would you type into an address bar e.g. www.techradar.com and convert them them into machine readable IP addresses. If an attacker is able to access your device e.g. through ARP Spoofing, or tamper with the public Wi-Fi router, you could type in the address of a legitimate website such as www.amazon.com, and be secretly redirected to a criminal phishing site. In this scenario the address bar will still show the web address for the website you intended to visit, hiding the criminal intent.
By using entrance techniques like ARP Spoofing and DNS Poisoning hackers can then deposit malware on your devices by redirecting you unknowingly to malicious links which will download the malware. Once your device is infected, they can continue to access it even when you disconnect from a public Wi-Fi hotspot and reconnect at home.
Beyond accessing your login credentials, security researchers have uncovered new malware components to the ‘Smokeloader’ malware that can use Wi-Fi triangulation to determine your devices real world location.
“Every 60 seconds it triangulates the infected systems’ positions by scanning nearby Wi-Fi access points as a data point for Google‘s geolocation API,” researchers at Secureworks say. “The location returned by Google’s geolocation API is then sent back to the adversary.”
The purpose of this frightening new geolocation is yet to be determined. Secure Works researchers suspect that learning the infected devices location could be used for intimidation tactics such as pressuring a victim into complying with their demands.
Although it can be scary, your device being infected with malware is not necessarily the end of the world. By ensuring your have malware removal and antivirus programs installed you can stop an infection in it’s track and reverse any damage. Malware removal tools on the are able to effectively remove viruses, malware, and ransomware, as well as fortify your computer against future attacks. While it is more important than ever to protect your devices than ever, the good news is it’s also easier than ever to install comprehensive and effective protection with a combination of the best malware removal tools and best antivirus software.
HOW TO PROTECT YOURSELF ON PUBLIC WI-FI
Virtual Private Networks, commonly referred to as ‘VPN’s’ are an important cybersecurity measure that can help to mitigate the risk of connecting to an unsecure public Wi-Fi network and enhance your online security. A VPN encrypts your online identity while you browse, ensuring that your browsing history is not stored on your device. It achieves this by establishing a digital connection between your device and a remote server owned by your VPN provider, encrypting your data in the process. This also allows you to conceal your IP address and bypass geographic specific content blocks or firewalls whilst browsing. The encrypted connection provided by a virtual private network adds an extra layer of protection, safeguarding your data from potential threats on unsecured Wi-Fi networks.
By utilizing a virtual private network, you are able to protect your privacy as well as fortify your online presence against a large array of cyber threats, creating a vitally more secure and private browsing experience.
HOW TO PICK A VPN TO SECURE YOUR DEVICE
Virtual Private Networks (VPNs) serve as an essential cybersecurity tool for encrypting your online connection and securing your device, particularly when connecting to unsecured and public Wi-Fi networks. But with so many different options on the market it can be difficult to know where to start with comparing the plethora of different aspects that each of the leading Virtual Private Networks bring to the table.
The first that you will need to consider is how you intend to use your VPN, determining whether it will be exclusively for personal, business purposes, or a combination of both.
Think about how you will incorporate different aspects in your day to day use and how hands on you want to be, whether this is just to keep yourself safer online or if you plan to use additional capacities to stream geographically restricted content, or to access torrents and gaming.
Ensure that you are taking into considering these key factors when selecting a VPN to meet your personal user needs including:
Simultaneous connections: Assess how many devices you intend to secure with your new VPN. Make sure you check the limit on the number of devices a VPN service allows you to protect simultaneously, making sure it accommodates your current requirements as well as any additional devices you may add in the near future.
Additional Features: Evaluate the additional features offered by VPN providers to determine which ones may justify any extra cost for you. For example with purchase, NordVPN offers built-in ad blocking or Express VPN’s 24/7 customer support which could save you money on purchasing multiple programs and further fortify your digital security. Check out any plan upgrades offered that may include a full security suite with antivirus, cloud storage, and data breach tracking.
Unblocking capability: Assess if the unblocking of location specific content on streaming services like Netflix or BBC IPlayer is a priority for you and if so opt for a VPN with the capability to bypass such restrictions quickly and effectively. Some VPN services offer dedicated servers for different uses,, like streaming and torrenting, which make it more convenient to unblock your favorite content, regardless of where you are.
Apps: Consider how you plan to access your VPN, keeping in mind the compatibility with your devices. Some VPNs offer apps for Windows, Mac, iOS, and Android but may lack support for smaller platforms such as Linux, routers, and smart TVs. Be sure to try out the associated apps to assess the user interface and ease of navigation across all of your devices.
Price: Once you’ve pinpointed the essential functionalities for robust cybersecurity on your devices, you can then compare the cost of applicable VPNs that meet your criteria. Be cautious not to compromise on quality and therefore compromise on your digital security. Don’t miss our list of the best cheap VPN services for our favorite secure options that are budget friendly.
THE BEST VPN IN 2024
Virtual Private Networks (VPNs) are an integral tool for fortifying the cybersecurity of your personal or business accounts and devices. They provide a secure and encrypted connection, safeguarding sensitive data from potential breaches, especially when connecting to unsecure public Wi-Fi.
By encrypting your personal or business data they help to protect your devices and accounts from cybercriminals seeking unauthorized access to personal information, confidential data and communications. They are also able to mask IP addresses and bypass geographic specific content blocks or firewalls whilst browsing. Their private, encrypted connection owned by the VPN provider adds an extra layer of protection, safeguarding your data from potential threats.
By utilizing a virtual private network, you are able to protect your privacy as well as fortify your online presence against cyber attacks, creating a vitally more secure and private browsing experience.
Need a quick answer on which VPN to download? These are our top three picks: