Welcome to My Website

Followers

Powered by Blogger.

Do not be hasty Use WiF

Posted by exel Monday, August 8, 2011


Until now, wireless Internet access / WiFi has been used by more than 700 million people worldwide.
Based on the findings of a research project that was launched globally by Brand Tracker Online Security provided by InSites Consulting (April-May 2011) and analysis of United Consultants, nearly half of world internet users use a wireless connection. Notebook became the most popular (41%), followed by a netbook (3%), smartphones (2%), and tablet computers (1%).
When people are at the Airport often they will take the time while waiting for the flight schedule, with WiFi access using a laptop though just to see and reply to multiple e-mail.
"What is not known to WiFi is a security risk of data especially related to data traffic that occur when starting Access. Login credentials and the traffic that occurs within the network will terendus even before an e-mail sent over a Wi-Fi hotspots, so it is generally the mode of data theft in the network, without being detected, "said Cameron Camp (Malware Researcher ESET).
Therefore, the hotspot users are required to increase vigilance when in the hotspot network is not secure, especially the access that does not require a password.
"Problems can occur from the technology proxy, which is able to intercept communications WiFi, capture, copy and store copies of data on computer players who are in the local network and then send it via WiFi networks really are. Symptoms of the scam could be felt from the traffic slowing e-mail your data. But because busy network traffic by all users in the network, it will be difficult to know that the traffic data we hijacked by the scam perpetrators, "added Camp.
Some of the threat that threatens the use of Wi-Fi connection:
- Evil twin login interception: a network set up by hackers to masquerade as the Wi-Fi hot spots is official.
- 0-day OS / app attack attempts: threat attacks through exploits that are not known.
- Sniffing: intercept attempts to achieve both software and hardware and computer to log traffic in a network.
- Data leakage (man-in-the-middle attack): Actors of cybercrime can modify network traffic and make the user unaware as if he was conducting transactions with banks, when in fact the data sent by the user sent to computer crimes them.

0 comments

Post a Comment