DATA STEALING ON PUBLIC WIFI | SAFE OR NOT SAFE ???



PUBLIC WIFI 

SAFE OR NOT


  

Hello guys welcome again to our blog , it's been late since i posted my previous post which was about how to set a payload in termux application ? If you had not visited that post please visit it. Our today's topic is a very common topic which is affecting many people unknowingly. You may guess the topic as i am going to give you a hint which may lead you. The hint is WIFI. I know many people are guessing right and rest are guessing slightly wrong. Some may be thinking of WI-FI hacking , WI-fi password scanning etc. But today's topic is about Public Wi-fi data stealing. Now you can guess that how much important this topic is. Some people are using Public Wi-fi unknowingly. And the hacker are stealing the data of the people. People usually connects their phones to public wi-fi like railway station, airports, bus stands, coffee shops etc.



The hacker took advantage of free Wi-fi facility and use it for their benefit. They make a fake access point or a fake hotspot in order to gain access to the victims' phones. This makes a very simple method to gain information about victims' usernames , passwords , bank details etc. They can also use your device as a botnet in order to perform distributed denial of service attack.
 

 HOW IT WORKS

 ?????

 Wherever you go , you may get a free Wi-fi connection and it is evident that some people will connect their phone to it. And this will lead them under attack. Fake Wi-Fi hotspots are often called honeypots because they lure their targets in with something irresistible: free Wi-Fi.  Hackers deploy honeypots in areas rich with high value targets where they don't have access to their secure networks.  The hacker makes his access point look like any other free Wi-Fi hotspot. He might even construct it to look like a hotspot his target has used in the history like railway station Wi-Fi. When an unknown person hops onto a honeypot, he can load all of the websites he or she normally visits on his laptop or tablet. The victim does not know that the hacker who set up the honeypot are spoofing his web traffic to appear as the sites he intended to visit. The hacker can track every step of surfing internet. 


HOW IT HURTS 

VICTIMS ?

Initially the hacker keep his eye on your surfed websites. They can steal the usernames , passwords , bank details and other credentials. They can do this just by reading his unencrypted traffic, but this also can occur on an innocent, unencrypted hotspot as well. They can do much more damage with a "man-in-the-middle" attack. This will act like victim and the destination website is communicating with each other but they don't know that their conversation is being listened by the man or hacker which is between them. That is why it is called man-in-the-middle attack.

The hacker can download files from the victims' computers. They can download images,videos, and files. 

They can redirect your device to a malicious websites that may affect your computer and can be used consecutively by the hackers. The hacker can remotely access the victims' device. Later it can be used for distributed denial of service attack. 


How to protect 

 

yourself from 

 

fraudsters

 

 You need to protect yourselves from these things because your privacy is being compromised. So here is the common methods to stay safe while surfing the internet on a public Wi-fi. First, anytime you are making a purchase please be careful about any request from bank to enter details because it can be virtual. It may suggest you to pay through your credit card or debit card in order to take your PIN (Personal Identification Number ).  

Listen to your Instinct: If something feels wrong then you should do the quality check whether it is a safe site or not . Don’t pay for goods or services unless you know and trust the individual or business.

You need to beware of anything unsual like asking for your personal details like (usernames, address , passwords etc.).

Nowadays , many cases has been seen in which the hackers or thieves rob your information by using phishing methods. If you don't know what is phishing then i have already posted about it you can visit there by clicking on this link --> What is phishing ? Some companies even display Ads for the awareness of fake calls. Don't trust a caller when he calls you and tell you some basic details about you. It is the best way to lure victims with some offers.


A VPN( virtual private network ) may result in a safe tool for the fluent working on the internet. Your phone is recognized by the IP address over the internet. So the VPN create a virtual IP address which hide you in the horde of the devices. Most of the people don't use it because they think it is bit difficult to set it up but this is not completely true. You just need to install an app for this. Many developer companies are providing VPN services application.

Some of the best VPN apps are listed below :

 

1. SURF SHARK VPN

2. NORD VPN

3. CYBER GHOST

4. PRIVATE VPN 

 

THANK YOU FOR READING AND STAY SAFE

DATA STEALING ON PUBLIC WIFI | SAFE OR NOT SAFE ??? DATA STEALING ON PUBLIC WIFI | SAFE OR NOT SAFE ??? Reviewed by Mr.Robot on December 06, 2019 Rating: 5

No comments:

Powered by Blogger.