Toronto Star

How to protect your data in public spaces

Free Wi-Fi networks, such as those found in hotels, airports and coffee shops, are often the least secure

- JUDY MANDELL THE WASHINGTON POST

The first time Jesse Harrison was hacked was around the time she logged on to a coffee shop’s open Wi-Fi network to pay a bill. She entered her credit card informatio­n and paid the bill as always.

But the next day she noticed something odd — there were fraudulent charges on her statement. It looked as if her credit card informatio­n had been stolen.

“I am very careful with my credit cards, and this was a card that I used very rarely,” Harrison said. “So I believe there is a high chance that’s how my informatio­n got stolen.”

Although it may be convenient to use free, public, unsecured Wi-Fi — such as those found in some hotels, airports and coffee shops — these networks are the least secure. Criminals have been using them to easily steal your informatio­n, potentiall­y hijacking your device and possibly your life through these unprotecte­d networks.

And these criminals are employing hard-to-notice tactics, such as sniffers and official-looking network names, to accomplish all of this.

“Gone are the days where you would have to be a computer engineer to hack into people’s devices via Wi-Fi,” says Ryan Wright, an associate professor of informatio­n systems at the Isenberg School of Management at the University of Massachuse­tts at Amherst. “Now any semi-tech-savvy person can download an applicatio­n and track any unencrypte­d traffic on the Wi-Fi connection.”

Good-guy IT security profession­als have been using sniffers, software that read wireless data as it travels through the air, to determine the security of a network. But bad guys have been using them to see your data as it travels from your device to the router communicat­ing the wireless Internet signal. And sniffers are hard to detect. “Think of wireless networks as the old-style party phones where anyone can pick up their phone and listen to other people’s conversati­ons,” Wright says.

“The only way you would know if someone else was listening on the party line was to hear them make an inadverten­t sound. Sniffers work under a similar principle. They listen to the traffic but rarely, if ever, generate any traffic on the network.”

Another way hackers can get your informatio­n while you’re travelling is by setting up a legitimate-looking Wi-Fi connection, which experts say are typically named something like “Free Wi-Fi” or “Public Wi-Fi.”

An unsuspecti­ng customer at say a coffee shop will then connect to the hacker’s “Free Wi-Fi” network, unknowingl­y giving the hacker his or her informatio­n. Criminals have also used default router names such as “Netgear” or Belkin to trick people into trying to find free Wi-Fi.

And if the customer has enabled sharing of folders, hackers can directly steal files and folders. The hackers also could spoof legitimate websites with hopes that people will provide a username and password. “When someone uses a spoofed Wi-Fi connection, hackers can then replace requests for legitimate websites with spoofed websites designed to steal usernames and passwords,” Wright says. “For example, if I access a spoofed Wi-Fi connection and go to American Express, the hackers would send me a fake website instead with the hopes that I enter in my username and password.”

All of this allows the hacker to just sit back and collect informatio­n that is garnered when people surf the web.

To guard your data against people who are up to no good while you are on the road, here are some dos and don’ts from Robert Siciliano, identity theft expert with BestIDThef­tCompanys.com. Don’ts

Don’t leave your spot without your device on you — not even for a moment. You may come back and still see your computer where you left it . . . but a thief may have installed a key logger in it to capture your keystrokes.

Don’t email messages of a sensitive or serious nature.

When your computer begins seeking out a network to connect to . . . do not let it just drift to the first one it wants. See if you can choose one. Don’t leave your file-sharing on. If you’re not using your wireless card, then don’t leave it on. Shutting down your wireless card on your device prevents your device from searching for and connecting to just any Wi-Fi. Many devices automatica­lly connect to a known and “trusted” Wi-Fi that may, in fact, be vulnerable to attack. Turning off the Wi-Fi card prevents your device from automatica­lly connecting to potentiall­y comprised networks.

Don’t do banking or any other sensitive activities.

Don’t position your device so that someone nearby can see the screen. Dos

Look around before you settle into a nice spot.

Sit somewhere so that your back is facing a wall.

Assume all Wi-Fi links are suspicious.

See if you can confirm that a given Wi-Fi link is legitimate.

Assume that if the connection name is similar to the Wi-Fi spot, that this could mean that the hacker was clever. Inquire of the manager of the coffee shop, hotel, etc., for informatio­n about their Wi-Fi access point.

You should consider using your cellphone for sensitive activities such as online shopping.

But cellphone or not, see whether you could avoid visiting sites that can make it easier for hackers to nab your data — sites such as those related to banking or social media and any site on which your credit card informatio­n is stored.

Use a VPN, or virtual private network. A VPN creates an impervious tunnel through which your data travels. The tunnel encrypts all of your banking, email and other sensitive transactio­ns, as well as downloads, so that you won’t have to worry about a thief or snoop intercepti­ng your transmissi­ons.

 ?? DREAMSTIME ?? Hackers can set up a legitimate­looking Wi-Fi connection.
DREAMSTIME Hackers can set up a legitimate­looking Wi-Fi connection.

Newspapers in English

Newspapers from Canada