Uncover the hidden secrets of free WiFi!

Uncover the hidden secrets of free WiFi!

Every time when you go out for shopping or playing, you often involuntarily connect to public WiFi due to insufficient data or in order to save data. Is this the case for you too?

While we follow these simple steps and enjoy the convenience brought to us by free WiFi, has anyone ever thought about the huge dark side hidden behind it?

Most people don’t consider whether the WiFi we connect to is safe or not. As long as we can connect and use it, we will be happy if the speed is fast. However, we are actually hurting ourselves.

Public WiFi has router and network vulnerabilities, which are exploited by hackers and lead to the theft of our personal privacy and funds. In particular, ordinary businesses such as restaurants, hotels, and cafes are high-risk areas for hacker attacks.

Mr. Lang from Beijing used his mobile phone to log into an online bank through public WiFi. One hour later, his bank funds were transferred or withdrawn 17 times, resulting in a loss of 34,000 yuan. When Mr. Chen stayed in a hotel in Nanjing, he connected to the WiFi without a password and played mobile games all night. At dawn, he found that all the equipment in his game account had disappeared. . . . . .

In recent years, various security issues have emerged one after another, and hacker attack methods have been constantly updated. Do we dare to continue to connect to other people’s free WiFi at will in the future?

Most of us Internet users have a weak awareness of security and preventing information leakage, and do not know how to identify phishing websites and guard against hacker attacks.

[[231133]]

I would like to suggest that when logging into public WiFi, first, do not blindly "connect to the network" to prevent phishing fake WiFi; second, do not conduct online shopping and online banking operations to avoid personal information leakage; third, do not habitually set the WiFi switch to the on position, as this will cause the mobile phone to automatically connect, which poses a great risk.

[[231134]]

Finally, I wish each of us safe use of mobile phones.

<<:  5G scenarios and technologies bring new security threats

>>:  The most beautiful ecosystem is on the road. Huawei China ICT Ecosystem Tour 2018 demonstrates the "power of walking"

Recommend

my country's network infrastructure already fully supports IPv6

At the 2020-2021 Global IPv6 Development and Outl...

...

Use Qt to create your own serial port debugging assistant

[[376484]] In my work, the thing I deal with most...

The difference between continuous delivery and continuous deployment

Continuous delivery does not mean that every chan...

Today, China’s 5G is two years old!

On October 31, 2019, the first day of the 28th Ch...

How Wi-Fi Location Services Enable IoT Asset Tracking

To locate IoT devices, you need a wireless commun...

TCP

[[381851]] This article is reprinted from the WeC...

Are you ready for 5G? Five new applications you'll see

Earlier this year, an article wrote: 5G will tran...