![]() We recommend using a tracker blocker, like the EFF's Privacy Badger (Opens in a new window). The built-in tracker blocking capabilities of browsers such as Firefox are also important for protecting your privacy. It's also important to know that much of your web browsing is already encrypted with HTTPS, although not all of it. Using a VPN covers the little that HTTPS can't, and also protects against ISP snooping very effectively. PCMag also strongly recommends using antivirus software on your devices, enabling multi-factor authentication wherever it's available, and using a password manager. These will all protect your devices and data from the most common threats. Outside your home, it's hard to tell which networks you encounter are safe. If you're at a coffee shop, for example, how can you tell which Wi-Fi network is legitimate? Unless the SSID is posted somewhere, you're just going to have to guess. Clever bad guys will set up access points with familiar names, hoping to trick people into connecting. Once victims are online, the bad guy executes an attacker-in-the-middle attack, potentially letting the nefarious attacker monitor your web traffic and even intercept some of it.Īn attacker doesn't even need to trick you, they just need to trick your phone or computer. Many devices are configured to reconnect to familiar networks by default. ![]() But if an attacker uses the same name of a popular Wi-Fi network-think Starbucks or Boingo Hotspot-your devices may automatically connect, even without your knowledge. This is easier than you think since many businesses have easily guessed Wi-Fi network names.īoth of those attacks require a lot of guesswork, but a good attacker won't bother with that. Instead, they'll configure their evil access point to switch SSIDs to match the ones devices are asking for. Granted, this is an exotic attack, but one that can be carried out successfully.
0 Comments
Leave a Reply. |