PDF Version: App-Access-Threat-To-Privacy
With the advancement of technology, there has been a rise in the use of wireless connectivity solutions. It has found applications in restaurants, coffee shops, offices and shopping malls. However, wireless connectivity in the form of Wi-Fi is inherently less secure. It is largely unprotected from threats that can result in theft of credentials and sensitive information. The unprotected access points expose your connection and personal data to cyber-attacks such as ‘Evil Twin Attack’.
Understanding An Evil Twin
An evil twin is a rogue wireless access point that appears as a genuine hotspot offered by a legitimate provider. It typically clones the MAC address, name and service set identifier (SSID) of the network. This makes it hard for the users to differentiate between original and fake access point.
An attacker can conveniently create an “evil twin” within the smart phone or other internet-capable device using some easily available software. He discovers the radio frequency of a legitimate access point and uses the same to send out his own radio signals with the same name as original access point. This enables the attacker to eavesdrop on the network traffic, capture traffic or plant malware on the system.
Implications To Cybersecurity
Once the fake access point is set up, it poses as a local hotspot. The attacker positions himself near the end-user so that his signal is strongest within the range. The strong signals tempt users to connect manually to the evil twin for internet access. Also, it can be a case where the end-user’s computer automatically chooses that connection. This allows the hacker to intercept user’s sensitive data that is being shared between user and the host. Thus, he can obtain sensitive information or login credentials resulting in identity theft or financial loss of the end-user. Attackers are also using social engineering to clone a login page through which credentials can be stolen.
Ways To Prevent Evil Twin Attack
To avoid evil twin network connections, following tips should be considered by end-users:
- Refrain from using public hot spots for online shopping or banking.
- Users should disable auto connect feature on all wireless devices.
- Connect via a virtual private network (VPN) to compress all traffic while using a public access point.
- Before connecting, ask the owner of the area for official name of the hotspot and security key, if any. Type the incorrect key intentionally; evil twin hotspots will grant access irrespective of the key.
Companies should also incorporate measures to protect corporate data from evil twin attack:
- Instruct employees to use Wi-Fi Intrusion Prevention Systems (WIPS) to prevent their systems from connecting to unauthorized duplicate access points.
- Protect company’s wireless connections with Personal Security Key (PSK) and provide its details to employees and customers.
For more information on IT security solutions for your business, call Centex Technologies at (254) 213 – 4740.
Giving your child access to using internet may be required for educational purposes but it is equally important to ensure how safely the internet is being used by them. Children can often come across dangerous online content which gives rise to the need for equipping yourself with necessary knowledge about online threats for your kids. They can browse through a lot of stuff either accidently or on purpose.
Following internet safety tips can help your child to manage online risks and enjoy safe use of internet:
- Achieving Internet Safety For Kids: Children, these days, are spending longer hours using online media for entertainment and education. Kids are more curious to explore further and trust whatever they see. This makes them susceptible to a lot of sensitive content. These unique set of problems require careful monitoring to help your kids achieve internet safety.
- Monitor Your Child’s Online Activity: Mostly children are not able to spot various scams and fall for unnecessary schemes. They are at an age which makes them unable to understand the difference between an ad, a spam or any other malicious attack. It is important to be aware of the sites that your child is visiting and tracking their online behavior. Also, there are various parental control apps to help parents monitor their kid’s internet usage in a better way. The apps keep a track of the online sites visited by your child. They also keep a control on internet connection time, block malicious websites and report any unusual online activity.
- Communicate With Your Child: Talk to your kids about the scams that they might be facing on internet and help them to understand the basics of cyber security. Emerging online threats and safe browsing on internet are other important topics that you should discuss with your kids. It is important to help them know about the implications of a virus to assist them in developing a better understanding on safe online browsing. Also, spending time online with your child can teach your kids appropriate online behavior.
- Make Sure Your Child Is Anonymous Online: It is important for kids to understand that they should not reveal any personal information such as address, phone number, or school name or location on social platforms. Exercising restraint is beneficial for their internet safety. Strictly instruct them not to post or trade any personal pictures. Inform them to use a screen name instead of real name. Make sure to let your kids know that they should never share passwords with anyone. Children should not agree to meet in person with anyone they met online without parent’s supervision and they should never respond to any threatening email or message.
For more information on keeping your child internet safe, call Centex Technologies at (254) 213-4740.