WARNING: what you don't know about WiFi hotspots can hurt you
Many people assume that their computer activity, email passwords, etc., are secure at public or home Wi-Fi networks. That assumption is often wrong -- a nearby eavesdropper using a laptop and off-the-shelf software can break into your connection within a matter of minutes. Do you think that the secure logon page of your email service will save you? In many cases, no. Many email services have a secure logon page, but send your emails to and from you without encryption, making them fodder for nearby snoops. Plus, many "secure" web sites send you "tokens" within a cookie, without encryption, which allow interlopers to literally take over your accounts. That's commonly called sidejacking.
In fact, in 2005, a security professional decided to use her laptop and off-the-shelf software to see how many passwords she could capture at hotels, airports, and other public networks. See:
"A constant state of insecurity: Passwords are in the air, and it isn’t even spring" - from InfoWorld
She collected, for example, an average of 118 passwords per night in overnight hotel stays (she collected them on hotel networks that were both wireless AND WIRED!). She was surprised that many supposedly secure web sites didn't implement their security protocols correctly, leaving their visitors open to hackers. She also found passwords to people's TiVos, online poker games, and online chatting communities. What disturbed her was that often these personal passwords were identical to the user's corporate passwords.
WEP is the weakest protocol for wireless security, but is the highest level of security you're likely to find at public hotspots. WEP was cracked long ago, and hackers can download off-the-shelf software that will crack it within minutes. So your best bet at public Wi-Fi hotspots is to log into what's called a Virtual Private Network (VPN). A VPN encrypts your connection to hide your data. You can use a VPN that you subscribe to, or is from your school, business, built into your router at home, etc. Or you can install the following program on your laptop, and use it to log into Hotspot Shield, which is considered the best free (ad-supported) VPN:
Hotspot Shield by AnchorFree
Now let's talk about your wireless network at home. I've seen the tech service from major electronics stores install wireless home routers for people using default or blank passwords, so don't rely upon those guys for your security. I set up a wireless network for my parents recently, and all but two of the 6 or 7 neighboring networks visible from within their house had no passwords at all. So all of the email passwords and traffic on those unprotected networks was sniffable and could be watched. Plus anyone could log onto those neighbors' wireless networks and carry out illicit activity over the web, leaving the neighbors holding the bag when the activity was traced to them. Or someone could just log onto those networks and slow them to a crawl by downloading songs or movies.
So make sure that your wireless home or office network uses at least WPA security, and preferably WPA2, and that you're not using any blank or default passwords.
Would you like to know when I add new reviews to the site?
Here's how to do that using Google Alerts. (1) Click on the link below to open the Google Alerts page. (2) Enter your email address. (3) Press the "Create Alert" button. Google will send you a confirmation email, then an email whenever a new review appears at Buy-a-Thon! (Make sure your spam filter doesn't block emails from google.com.)
Click here to open the Google Alerts page.
Buy-a-Thon is not sponsored by, endorsed by, or affiliated with Google, and the views and opinions expressed here do not represent those of Google or Google personnel.
Did you find what you were looking for? If not, enter the name of that item here, and click search:
The following terms are trademarks of Lenovo in the United States, other countries, or both: Lenovo; ThinkPad. Buy-a-Thon is not sponsored by, endorsed by, or affiliated with Lenovo, and the views and opinions expressed here do not represent those of Lenovo or Lenovo personnel.
Copyright © 2008 GORILLAgent®. All Rights Reserved.