Skip to main content

Take precautions on public Wi-Fi

KUALA LUMPUR: If you are surfing the Internet on a public Wi-Fi, always assume someone is watching you out there.

Better yet, do not connect to any public Wi-Fi at all, said LE Global Services (LGMS) executive director Fong Choong Fook, whose private cybersecurity firm employs hackers to test the network security of the country’s major banks.

“I would never use a public Wi-Fi,” he said.

“Even an IT person may not be able to tell if the access point he is connected to is safe or if the activities are being watched.

“There may be signs like your Internet is slowing down but hackers can make it so elegant that you won’t even notice,” he said in an interview.

Malaysia’s national cybersecurity agency CyberSecurity Malaysia (CSM) said hackers could position themselves between a person’s device and the Wi-Fi router and are able to record sensitive data that the surfer is keying into his device.

Hackers can also “create” their own Wi-Fi and trick people into thinking they are connected to a credible public access point like the one from a restaurant, airport or office – when in actual fact these devices are connected to the criminals’ hardware.

Thus, they would be able to remotely watch everything a person is sending out on the Wi-Fi like passwords, e-mails or credit card information.

As frightening as these attacks may sound, Fong said this had been going as early as the 1990s.

Demonstrating to The Star how a hacker could steal information, LGMS set up an “evil twin” Wi-Fi using a laptop and named it after a famous franchise restaurant just below its office in Puchong, Selangor.

Fong connected two devices to this Wi-Fi and proceeded to log into social media, e-mail and Government websites.

Within seconds of logging in, the hacker’s computer began recording the activities in both devices in the experiment – recording every e-mail address, username and password that was keyed in.

Though the demonstration was only meant for the devices in the controlled environment of the LGMS office, three other users got connected to the dummy Wi-Fi, thinking they were linked to the franchise restaurant’s Internet, during the experiment.

“Hackers can target one specific person or they can target everyone in a cafe to get their devices to send all their data through their dummy Wi-Fi

“When they have your information, they can steal your identity. They can pose as you on Facebook, or send out e-mails to your contacts under your account,” he said.

Fong advised users to avoid connecting to public Wi-Fi or to only limit their browsing to Internet searches if they must connect to one.

The firm also suggested users to subscribe to VPN (virtual private network) technologies to secure their traffic.

VPN encrypts data on devices, making it hard for hackers to spy on the user’s online activities. Most VPNs are available on a subscription basis, much like an anti-virus programme.

So far this year, CSM has recorded eight instances where private Wi-Fi networks were hacked and 1,462 cases of online intrusions have been reported, which is nearly double the number of incidents compared to the same period in 2015.

It advised users to keep their Internet browsers up to date and to disable the feature which automatically saves password in the cache –as it makes it easier for criminals to steal.

Comments

Popular posts from this blog

Happy Eid Mubarak from iZND Group of Companies

Selamat Hari Raya

Maaf Zahir dan Batin
~ Ikhlas dari iZND Group of Companies ~

Leaked Android KitKat 4.4.2 on Samsung Galaxy Note 10.1 GT-N8000 now available

Update Galaxy Note 10.1 to Leaked N8000XXUDND5 Android 4.4.2 KitKat Test Firmware
This Android 4.4.2 test firmware was leaked by XDA forum member Izap and re-packaged by me so that you guys can easily download and flash the firmware, as the firmware was originally leaked in 11 parts which was a bit confusing for the users.

Model: GT-N8000
Country: Open Europe
Version: Android 4.4.2
Changelist: 1430589
Build date: Wed, 23 Apr 2014 03:09:45 +0000
Product Code: OXA
PDA: N8000XXUDND5
CSC: N8000OXADND5
MODEM: N8000XXUDND2
Download:N8000XXUDND5_N8000OXADND5_N8000XXUDND2_OXA.zip

NOTE
- You are doing this at your OWN risk. We are not responsible if you brick your device or your cat eats your phone.
- This test firmware will NOT increase your binary counter NOR void your warranty.
- This test firmware is a PRE-RELEASE build and not official from Samsung.

INSTRUCTIONS
- Extract (unzip) the firmware file
- Download Odin3 v3.09 (From here or here)
- Extract Odin .ZIP file
- Open Odin3 v3.09
- Restart tablet in downl…