In today’s hyper-connected world, mobile devices are an integral part of daily life, allowing us to stay in touch with others, access the internet, and manage countless tasks on the go. A feature that enhances mobile connectivity is Wi-Fi, which lets users connect to the internet when cellular networks are unavailable or too costly. While the convenience of mobile Wi-Fi is undeniable, leaving it on continuously can expose users to a range of cyber threats that could compromise personal data, security, and privacy.

Here’s a deeper look into the cyber risks associated with keeping your mobile Wi-Fi on:

1. Exposing Your Device to Public Wi-Fi Attacks

Many users leave their mobile Wi-Fi feature turned on, unaware that it can automatically connect to nearby public Wi-Fi networks. These networks, found in coffee shops, airports, and hotels, may not always be secure. Cybercriminals can exploit public Wi-Fi to launch various types of attacks, including:

• Man-in-the-Middle (MitM) Attacks: In this type of attack, the hacker intercepts the communication between the user and the network, allowing them to capture sensitive data such as passwords, credit card information, or personal messages. Without encryption, it’s easy for attackers to eavesdrop on unprotected Wi-Fi connections.

• Rogue Hotspots: Attackers can set up a rogue Wi-Fi hotspot with a name similar to a legitimate public network. Once connected, your device can become a target for malicious activities, including data interception or malware installation.

2. Data Exposure and Unauthorized Access

When your mobile Wi-Fi is left on, especially when connected to an untrusted network, your device becomes an open gateway for potential attackers. The lack of encryption or secure connections (such as using HTTP instead of HTTPS) means your data can be intercepted while you browse, send emails, or use apps. Furthermore, leaving Wi-Fi on can also expose personal information that may be accessible through poorly secured apps or device settings, leading to unauthorized access.

3. Location Tracking and Privacy Risks

Wi-Fi networks can be used to track your location. Many mobile devices, when connected to a network, can broadcast their presence and link up with nearby routers. This can be used by malicious entities to track a user’s movements, potentially leading to privacy violations. While this is a more common concern with mobile apps that ask for location permissions, a continuously active Wi-Fi connection increases the chances of being tracked without your knowledge.

4. Device Vulnerabilities

While newer smartphones have a variety of security mechanisms, leaving mobile Wi-Fi on can expose devices to malware. Some mobile devices may not be fully protected against vulnerabilities in their software or operating system. Attackers could exploit these gaps while your Wi-Fi is active, using it as an entry point to install malicious software, spy on activities, or steal sensitive information.

• Wi-Fi Phishing: Cybercriminals can use fake networks or spoofed access points to trick users into entering sensitive information or logging into malicious websites that steal credentials.

5. Battery and Data Consumption

While not a direct cyber threat, keeping your mobile Wi-Fi on at all times can lead to excessive battery drainage and increased data usage. Continuous searches for networks, especially in areas with weak Wi-Fi signals, can cause your device to work overtime, consuming battery life faster and using more data in the process. This can add up quickly, particularly if you’re on a limited data plan.

Best Practices to Mitigate Cyber Threats

To protect yourself from the potential risks of leaving mobile Wi-Fi on, consider these simple but effective strategies:

• Turn Off Wi-Fi When Not in Use: The most straightforward way to avoid risks is to disable your Wi-Fi when you don’t need it. This minimizes the chances of connecting to unknown or unsecured networks automatically.

• Use VPNs: If you must use public Wi-Fi, always connect through a Virtual Private Network (VPN). VPNs encrypt your internet traffic, making it far more difficult for attackers to intercept your data.

• Enable “Ask to Join Networks”: Instead of letting your phone automatically join open Wi-Fi networks, set it to prompt you before connecting. This prevents your phone from connecting to rogue networks without your knowledge.

• Keep Your Device Updated: Regularly update your phone’s operating system and apps to patch any security vulnerabilities. Cybercriminals often exploit outdated software to carry out their attacks.

 • Use Strong Authentication: Enable two-factor authentication (2FA) on your important accounts, such as email or banking apps. This adds an extra layer of security if your device is compromised.

• Monitor Wi-Fi Connections: Periodically check the Wi-Fi networks your device is connected to. If you’re unsure about any network, disconnect immediately.

Conclusion

While mobile Wi-Fi is an incredibly useful feature, it’s important to be mindful of the potential security and privacy risks associated with leaving it turned on at all times. Public Wi-Fi networks, unsecured connections, and the potential for malicious activity can expose you to serious cyber threats. By taking simple precautions like turning off Wi-Fi when not in use, using a VPN, and regularly updating your device, you can significantly reduce the chances of falling victim to these threats, ensuring that your data remains safe and your online experiences are secure.

The post Cyber Threats of Keeping Mobile Wi-Fi On: A Growing Concern appeared first on Cybersecurity Insiders.

In a survey conducted by broadband service provider Konnect, over 4 million people were found hacking neighbors’ Wi-Fi, if there was a down or to avoid paying a fat subscription fee.

A study that included a response from about 2000 respondents also confirmed that on average a hacking person was found using the internet of their neighbor without permission for a time frame of 52 days, while over 20 people were found using the connection all year long.

Technically, using an internet connection of a neighbor without permission is called ‘Piggybacking’ and is usually done to avoid subscription fees. In some situations, the web is only used if a connection goes down. But in most cases, that is over 35% of respondents were found using the internet without the knowledge of their neighbors.

Konnect survey says its study not only found people using internet connection fraudulently. A few of them cited the reason for visiting McDonald’s and other public places to download movies, games, or TV shows.

“People usually expect a reliable and consistent web connection in this digital age. But it was found in our study that millions of households are still using the low-priced connections to cut down their monthly budget and hacking others’ internet to quench their online needs of watching TV shows, staying active on social media channels, and watching newly released movies online”, said James Soames the Marketing Director of Konnect.

Only 1% of them agreed what they did was wrong and assured that they will get a connection for themselves by Christmas. Others said they are using resources and opportunities as they strike them in life.

Most of the participants in the survey agreed they hacked their neighbor’s router by using password guess, the hacking router from the basic skills available on YouTube, or by using the tech minds of friend’s n family members.

So, what’s the best way to keep your Wi-Fi router safe and well protected from neighbor hacks

  • Change the default router password

  • Use a password that is filled with alpha-numeric characters and tucked with 1- 2 special character

  • Always use a password that is 14-18 characters long as it takes approximately 18 years for a hacker to guess such a password with permutations and combinations

  • Never disclose a password to anyone or publicly write it and stick it on the paper

 

The post Over 4 million people hack neighbors Wi-Fi in the UK appeared first on Cybersecurity Insiders.

1) Indian Computer Emergency Response Team (CERT-In) has given an update that all those who are using Adobe products and services should be cautious, as hackers can easily hack their systems by exploiting multiple vulnerabilities in the software.

According to CERT-In, the attacker can gain access to admin privileges, execute arbitrary codes and write arbitrary files on InDesign, InCopy, Illustrator, Bridge, and Animate services that work both on Windows and macOS.

So, users are being urged to keep their software up to date with the latest security updates to keep their systems well protected from such attacks.

2.) Second is the news that belongs to WordPress, the content management system provider offering services worldwide. WordPress forcibly issued an update to over millions of its sites after security researchers from WordFence Threat Intelligence documented an advisory about a code injection vulnerability.

After learning about the vulnerability, WordPress released an immediate update and applied the following plugins: 3.0.34.2, 3.1.10, 3.2.38, 3.3.21.4, 3.4.34.2, 3.5.8.4, and 3.6.11 on an automated note.

3.) Third is the news about QNAP storage devices. These company devices are being made as soft targets every month. And the latest news about these Taiwan-based network-attached storage makers is that two ransomware gangs recently targeted it.

First is the gang that is distributing DeadBolt Ransomware, and the second is the malware variant dubbed QNAPCrypt.

Cybersecurity researchers have found that the QNAP devices operating on weak passwords or operating outdated software are being targeted with the two said file-encrypting malware variants.

For keeping their systems updated, QNAP users are being urged to use strong passwords for admin privileges, use IP access protection for keeping brute force attacks at bay and avoid ports 443 and 8080 and keep the NAS systems updated with the latest QTS software versions.

4.) Fourth is the news related to a Russian botnet network that contains millions of infected machines and devices. RSocks botnet that is believed to be funded by Kremlin intelligence was shut down by law enforcement acting on a judgment pronounced by DoJ.

RSocks were being used by cybercriminals to launch credential stuffing attacks, account hijacks, phishing emails, and fraudulent induction of mining software.

The botnet was on the tracking radar of the FBI since 2017 and has taken control of millions of devices that including industrial control systems, routers, CCTV systems, AV Streaming devices, and IoT.

In the year 2019, RSocks was seen adding millions of android devices and small computers to its list.

Now that the law enforcement authorities have taken control of the devices based on the inputs provided by Microsoft, it brought the highly sophisticated Russian crime to an end in May this year.

5.) On Tuesday last week, Microsoft added an update that addressed its operating system’s Wi-Fi accessing capabilities via its Hotspot feature. As the issue was affecting all its Windows 10 and 11 operating systems, the tech giant issued a patch on June 14 of this year.

As per the details released by the Windows giant, the issue was a bug-driven update known as KB5014697 and was blocking users from using the Wi-Fi hotspot feature.

Already the company has issued an update on the issue and is expected to be rolled out to all its users by this month-end.

For the time being, tech analysts say that the update can be rolled back, but as per our analysts, it is not recommended at all.

 

The post Cyber Attack news headlines trending on Google appeared first on Cybersecurity Insiders.