Walking around the street seems to be exciting and less boring with a WiFi connection. But at the same time it is a high risk to your privacy as attackers with malicious intentions are waiting for a chance to invade your account and steal all the important and private stuff. Growing Internet devices are opening new doors for the attackers greater access to the crime.
One of the renowned hackers, Jayson Street, has efficiently visualized the attack scenario and for that all the hacker just need is to sett up an EvilAP (malicious access point) and to be around someone’s device.
By creating a fake Wi-Fi connectivity, Jayson gathered people around him showing this as a legitimate Wi-Fi connection. And once the person connected to the Wi-Fi, his/her personal information transferred to the attacker’s device enabling him to gain access to the personal information, password and other private data.
HOW TO AVOID BEING THE VICTIM OF “EVIL TWIN ATTACK”
In order to prevent being a victim of attack, ‘Pwnie Express’ – a security research company – has published its yearly report on what preventive measures one should take to remain safe and vigilant against cyber crimes.
From the report following are the quick steps to follow;
- Keep your Wi-Fi off when you are not using it, to minimize chances of being attacked.
- Disable the functions that you are not using for the recently bought device. Always remember to check the device before bringing it to the work place.
- Set up passwords that are strong enough to secure your device. Moreover, never use the same password for different account.
- When you are purchasing a device always check its authenticity and make sure you know how to update the software linked to that device.
- Brands could be more prone to security issues so buy a device after verifying it.
Share this article
About the Author
Zehra Ali is a Tech Reporter and Journalist. She has done her Masters in Mass Communication. Topics related to cybersecurity, IoT, AI, Big Data and other privacy matters are extensively covered by her on various platforms. You can follow her on twitter.
More from Zehra AliRelated Posts
Passengers’ Data Stored on User Devices, not on DigiYatra Storage, says India Govt
KEY TAKEAWAYS Unblocking streaming content from Amazon Prime is easy only if you know the reliable V...
NCSC Chief: Clear Rules Needed to Prevent Cyberspace Conflict and Struggle
A safe and secure digital world necessitates a clear definition and enforcement of international cyb...
‘Revive’ has been upgraded to a banking Trojan on Android
This month, Cleafy’s security researchers discovered a new Android Banking Trojan in the wild....
Asian Industrial Control Systems Targeted by Hackers Using the Shadowpad Backdoor
Unpatched Microsoft Exchange servers in various Asian countries were the target of an attack campaig...
Data Breaches Could Occur Due to Kubernetes Misconfigurations That Were Leaked.
Over 900,000 Kubernetes (K8s) have been discovered to be vulnerable to malicious scans and/or data-e...
Attacks by Cybercriminals Will Become the Main Threat in 2024. Privacy Issues Tendencies
Internet Privacy is the main Concern today Advertisers track your online activities and interf...