Every time when you go out for shopping or playing, you often involuntarily connect to public WiFi due to insufficient data or in order to save data. Is this the case for you too? While we follow these simple steps and enjoy the convenience brought to us by free WiFi, has anyone ever thought about the huge dark side hidden behind it? Most people don’t consider whether the WiFi we connect to is safe or not. As long as we can connect and use it, we will be happy if the speed is fast. However, we are actually hurting ourselves. Public WiFi has router and network vulnerabilities, which are exploited by hackers and lead to the theft of our personal privacy and funds. In particular, ordinary businesses such as restaurants, hotels, and cafes are high-risk areas for hacker attacks. Mr. Lang from Beijing used his mobile phone to log into an online bank through public WiFi. One hour later, his bank funds were transferred or withdrawn 17 times, resulting in a loss of 34,000 yuan. When Mr. Chen stayed in a hotel in Nanjing, he connected to the WiFi without a password and played mobile games all night. At dawn, he found that all the equipment in his game account had disappeared. . . . . . In recent years, various security issues have emerged one after another, and hacker attack methods have been constantly updated. Do we dare to continue to connect to other people’s free WiFi at will in the future? Most of us Internet users have a weak awareness of security and preventing information leakage, and do not know how to identify phishing websites and guard against hacker attacks.
I would like to suggest that when logging into public WiFi, first, do not blindly "connect to the network" to prevent phishing fake WiFi; second, do not conduct online shopping and online banking operations to avoid personal information leakage; third, do not habitually set the WiFi switch to the on position, as this will cause the mobile phone to automatically connect, which poses a great risk.
Finally, I wish each of us safe use of mobile phones. |
<<: 5G scenarios and technologies bring new security threats
While Single Pair Ethernet (SPE) has been around ...
In the rapidly evolving world of telecommunicatio...
Professor Ryo Nagase of Chiba Institute of Techno...
Recently, more and more mobile phone manufacturer...
Starting from July 1, the three major operators o...
Author | zorrozou Preface The TCP protocol is a p...
Enterprises need to monitor and measure the integ...
On November 25 last year, the European RIPE NCC m...
CloudCone launched a flash sale in April, offerin...
HostXen is a Chinese hosting provider founded in ...
On April 15, the Bluetooth Special Interest Group...
Private 5G is the next evolution of networks for ...
While drawing parallels between 5G and national s...
With the continuous development of mobile phones,...
The current network industry seems to no longer f...