Skip to main content

Protect Information on Public WiFi

How often do you hear cases of social media accounts, bank accounts and other private accounts being hacked? This has become some sort of a common occurrence for internet users especially those with an affinity for public WiFi. It seems like people don’t know the proper ways to protect information on public WiFi. They go around dipping their devices in any network they can find and end up falling victim to cyber crimes.

It is often that you see ladies complaining that their Instagram accounts have been hacked and their private (NSFW) photos doing rounds on social media and pornography websites. Cyber insecurity seems to be the order of the day especially with the new trend of internet memes where people’s photos are being used against their will giving rise to numerous unwanted lawsuits.

Public WiFi has always been the number one medium for cyber crimes. All the disgraced I.T graduates are well aware that that is the best place to land victims and they have taken full advantage. While you are busy logging into your 267 different accounts on the internet, they are lurking in the shadows as they masterfully eavesdrop on your every move and gain access to your life. Soon, all hell breaks loose and your digital world turns upside down. The worst part is, some of them don’t have any definite goal. They just want to cause trouble and ruin lives. So, while you are enjoying that free WiFi, do your research and equip yourself with ways to avoid this conundrum.

First and foremost, before you connect to any WiFi, make sure you know whose it is and where it is from. If it is a restaurant or a coffee shop, ask one of the employees about the WiFi first. Let them tell you whether it is safe or not.

Laptop users are particularly at more risk of being hacked. One of the biggest mistakes they make is leaving their file sharing on. Well, some of you might be hearing this for the first time and that already is a sign of weakness in itself. Once file sharing is on, any person-hacker or not can gain access to your files as long as you are both on the same network. This means you would have given the hacker free entry.

Some of these measures are basics that can take you only 15 minutes to learn. If you want to stay safe and not be part of the statistics, learn them or better yet, stick to private networks.

Comments

Popular posts from this blog

HCI: Research Topic Ideas

I was reading an interesting research paper (Personal Tasks at Work: An Exploration, ACM 2017) in which the writer talks about the personal tasks that we have to do at work such as scheduling appointments, paying electricity and other bills, etc. The problem at first seems to be a social science one which has nothing to do with computer science but when looked closely the problem highlights an important aspect of our daily life that has to be sorted out using technology. The paper basically discusses those tasks and categorizes them based on frequency of occurring based on a survey. So, for example out of the 93 people who participated in the survey presented in the paper, 51% reported a need for scheduling an appointment while 33% have to coordinate their personal activities. Some will say (specially management science guys) that few of the problems can be solved by proper time management but remember that the purpose of technology is to make life easier for humans. Also, not every …

Simplified DES Example: Step by Step

Simplified DES or S-DES is an encryption algorithm which follows feistal cipher structure. In this tutorial, we will take an example of S-DES. Let’s get started.
We need plaintext and key to start with. For this example, let’s consider 01001000 be the 8-bit plaintext and 1110001110 be the 10-bit key.
Key Generation: The first step in S-DES process is key generation. From the 10-bit key that we give as input, it generates 2 1-bit keys called k1 and k2. Following is the process:
1.Pass the 10-bit input key into the P10 table:
3 5 2 7 4 10 1 9 8 6
This gives: 1011001110. (For example, take the 3rd bit from input key which is 1. It becomes the first bit for our new key) 2.Divide the new key into two halves and left shift each half’s bits by one. So by dividing we get 10110 and 01110. We perform left shift so the left most bit becomes the right most bit and remaining each bit is shifted to its left. This gives: 01101 and 11100. Or you can think of it as the left most bit is taken to the righ…

Cyber Security Awareness: for Employees

The insecurity of data and information that exists on the internet and computer networks has been a major issue for a number of businesses, organizations, and institutions; which don't invest on network and internet security training and awareness programs for their employees. Ideally, most employers rush to invest in new and expensive technologies in the name of protecting their companies online, not knowing that in most cases, the safety of a company online largely depends on the cyber security awareness of the employees. Consequently, your company's protection online starts by ensuring that your employees are well equipped with basic network safety practices and policies, so that they can assist in keeping your computers and networks safe from cyber-attacks that come in form of a virus, malware, and cyber-crime.

Different Ways to Create Cyber Security Awareness to Your Employees:
1.Authentication
The most basic network security measure that your employees need to use is a pass…