WATCH: The 3 least secure free Wi-Fi spots of 2017

Are you part of the 87 percent of Americans that use public Wi-Fi? If your answer is yes then you could be in the crosshairs of a hacker. That's right, free Wi-Fi comes with a price and it’s your information. Jared Cotter is talking with security expert Kevin Mitnick to find out where the three spots are where you’re more likely to be hacked, and how to better protect yourself

1.  Coffee Shops

That latte comes with a side of danger. How can you avoid it? The first recommendation is don't even use it. Instead of connecting to that free available Wi-Fi bring your own instead. You can buy a portable internet device from your favorite mobile operator - configure it to use WPA2 encryption - which is easy to do. Now only use your own device or tether your cellphone. Those devices average around $100.

2.  Airports

While you're hopping a flight a hacker could be jacking your info. Just turn your Wi-Fi off when you're not using it so no one can access your data.

3.  Hotels

While you check in, hackers check out everything on your device. If you just have to use that Wi-Fi you need to use a VPN service. VPN stands for Virtual Private Network and it hides who you are and where you are when using the internet.

Watch the Video (and more cool ones) here:   http://www.thelisttv.com/the-list/the-3-least-secure-free-wi-fi-spots-of-2017

Source: the LIST

Topics: Speaking Engagements, VPN, risky Wi-Fi spots, data theft, free Wi-Fi, Hotel WiFi, IP Vanish, virtual private network, WPA2 encryption, airport WiFi, cellphones, coffee shop Wi-Fi, data security, anonymity, Kevin Mitnick

Latest Posts

Kevin offers three excellent presentations, two are based on his best-selling books. His presentations are akin to technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness.”

The Growth of Third-Party Software Supply Chain Cyber Attacks

When testing your employees' social engineering readiness, your teams need simulated attacks that feel as if they’re coming from a nefarious engineer...

Read more ›

Bypassing Key Card Access: Shoring Up Your Physical Security

As you build additional layers of defense into your cybersecurity framework, it's important to implement physical security strategies as well.

Read more ›

How to Prioritize Your Pentesting Report’s Remediation Recommendations

If you recently received a penetration test, you’re on the right track to improving your cybersecurity posture. However, you may be wondering what the..

Read more ›
tech-texture-bg