Cyber Security Articles & News

WATCH: The 3 least secure free Wi-Fi spots of 2017

Are you part of the 87 percent of Americans that use public Wi-Fi? If your answer is yes then you could be in the crosshairs of a hacker. That's right, free Wi-Fi comes with a price and it’s your information. Jared Cotter is talking with security expert Kevin Mitnick to find out where the three spots are where you’re more likely to be hacked, and how to better protect yourself

1.  Coffee Shops

That latte comes with a side of danger. How can you avoid it? The first recommendation is don't even use it. Instead of connecting to that free available Wi-Fi bring your own instead. You can buy a portable internet device from your favorite mobile operator - configure it to use WPA2 encryption - which is easy to do. Now only use your own device or tether your cellphone. Those devices average around $100.

2.  Airports

While you're hopping a flight a hacker could be jacking your info. Just turn your Wi-Fi off when you're not using it so no one can access your data.

3.  Hotels

While you check in, hackers check out everything on your device. If you just have to use that Wi-Fi you need to use a VPN service. VPN stands for Virtual Private Network and it hides who you are and where you are when using the internet.

Watch the Video (and more cool ones) here:   http://www.thelisttv.com/the-list/the-3-least-secure-free-wi-fi-spots-of-2017

Source: the LIST

Topics: VPN, risky Wi-Fi spots, data theft, free Wi-Fi, Hacker, Hotel WiFi, IP Vanish, keynote speaker, virtual private network, WPA2 encryption, airport WiFi, cellphones, coffee shop Wi-Fi, data security, anonymity, Kevin Mitnick

Latest Posts

Kevin offers three excellent presentations, two are based on his best-selling books. His presentations are akin to technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness.”

Entering the Metaverse for Your Virtual Cyber Security Events

Virtual events can utilize virtual reality (VR) and the Metaverse so you can host a memorable event that also trains your attendees in all things cybe..

Read more ›

Does Kevin Mitnick Still Hack?

Kevin Mitnick is best known for some of his earlier hacks on Motorola and other enterprise companies that earned him a spot on the FBI’s most wanted l..

Read more ›

The Most Common Social Engineering Techniques We’re Seeing This Year

With today’s available technology, threat actors have become masterminds at exploiting vulnerabilities to steal private data, and sometimes, even gain..

Read more ›
tech-texture-bg