Recently, cyberattacks on home wireless routers have frequently occupied the headlines of security news. Broadband Genie recently commissioned a security agency to conduct a security survey on wireless routers and found that more than half of UK users' routers use the default router account settings, which are at risk of being attacked by hackers. At the same time, 54% of users are worried about being hacked. In a survey of nearly 2,000 home users, it was found that 53% of users kept the default settings on their home routers. With the popularity of mobile devices and the rapid development of home IoT devices, wireless routers are not only the network center of the home, but also the smart control center of the home. Once attacked by a network, not only the user's personal information and property will be lost, but also their lives will be disturbed by hackers. In addition to the unpatched vulnerabilities in the manufacturer's firmware, many users do not consider security issues when configuring wireless routers and do not have basic network security awareness. The survey shows that only 19% of users have accessed the "system management" function on their routers, 22% have checked which devices are connected to their networks, 17% have changed the administrator password, and 14% have updated the router's firmware. The survey results are simply shocking. Home wireless routers are very vulnerable. If users cannot manually set them up, the weaknesses of the routers will always exist. Both operators and equipment manufacturers have made users ignore the importance of router security. Think about what is said above, has it happened to you as well? Here we recommend that users immediately update the latest firmware released by the manufacturer and change the default management password of the router background. It is best to set the WiFi password and administrator password at home in the form of "numbers + letters + symbols", which is the most difficult to crack. Do not use the same or logical numbers, which are the easiest to attack. At the same time, you must also close the remote management port in the router background to prevent the router from being controlled and becoming a member of the botnet.
|
<<: The greater development of 5G lies in industrial applications
>>: TD-LTE wins award: Guarding 5G and leading the world
In the digital age, acquiring website traffic dep...
[51CTO.com original article] 2020 is destined to ...
HostYun (Host Cloud) is the original Host Sharing...
We keep hearing about the construction of future-...
LOCVPS is a long-established Chinese VPS service ...
RAKsmart is an early-established foreign hosting ...
According to foreign media reports, Spanish Telef...
On the 17th local time, the Brazilian government&...
Previous: Highlights | Contents of the 39th GTI S...
Recently, Ericsson commissioned management consul...
Digital-VM is a foreign VPS service provider esta...
How does wireless charging technology work? Befor...
In 2019, we often heard the industry say that 201...
From August 21st to 23rd, the 2018 (4th) China Sm...
[51CTO.com original article] The general public...