기본 콘텐츠로 건너뛰기

These are the 10 airports where you're most likely to be hacked

  • Millions of travelers are vulnerable to cyberattack if they join public Wi-Fi networks in airports, according to a new report by Coronet, a cybersecurity company. 
  • Here's what experts say to do to avoid cyberattack and what to do if you've joined a public Wi-Fi network in the past.
Sam Hodgson | Bloomberg | Getty Images
Travelers walk through San Diego International Airport in San Diego.

There's a bigger danger lurking in U.S. airports than mediocre meals: public Wi-Fi networks.
The convenience of these easy ways to connect online is often masked by the fact that many are unencrypted, insecure or improperly configured, according to a recent study by Coronet, a cybersecurity company. If that's the case, it is much easier for hackers to access your device and install malicious software, steal your passwords or login information and download other data such as emails.
Hacking, which includes phishing, ransomware, malware and skimming, is the most common type of data breach and accounts for 60 percent of attacks, according to a 2017 study by the Identity Theft Resource Center. These attacks can lead to identity theft, which along with debt collection, imposter scams and other kinds of fraud, cost consumers $905 million in total losses in 2017, according to the Federal Trade Commission.
To rank airports by their threat level, Coronet looked at data from the 45 busiest American airports over five months at the beginning of the year. Then, it assigned each airport a threat index score based on the vulnerability of devices and risk of networks used.
“The main reason airports are problematic is because most people are taking convenience over security,” said Dror Liwer, chief security officer and co-founder of Coronet.

These are the top 10 worst airports for cybersecurity 

Ranking
Airport
City
State
Threat Index Score
1San Diego International AirportSan DiegoCA10
2John Wayne Airport- Orange County AirportSanta AnaCA8.7
3William P Hobby AirportHoustonTX7.5
4Southwest Florida International AirportFort MyersFL7.1
5Newark Liberty International AirportNewark NJ7.1
6Dallas Love Field DallasTX6.8
7Phoenix Sky Harbor International AirportPhoenixAZ6.5
8Charlotte Douglas International AirportCharlotteNC6.4
9Detroit Metropolitan Wayne County AirportDetroitMI6.4
10General Edward Lawrence Logan International AirportBostonMA 6.4
Source: Coronet 

What's at risk on public Wi-Fi

There are three major things that you're putting at risk when connecting to a public Wi-Fi network, Liwer says.
1. Device
Many malicious public Wi-Fi networks look like any other network, according to Liwer. But when you click on ‘accept terms and conditions’ to join, you may be installing malware on your device.
2. Credentials
If you’ve connected to a dangerous network, you could be a target for Wi-Fi phishing. This is when a hacker makes a webpage that looks exactly like another one, such as the sign-in for your work email, according to the Federal Trade Commission. When you enter your username and password to access your email, you’re actually entering your information into a hacker’s site.
3. Data
This is especially important for business travelers who may be working on the go, Liwer said. If you are on a hacker’s network and transferring data to or from a coworker, it is all going through the attacker’s devices. He or she can then do with it what they please, said Liwer.

How to avoid a cyberattack

To keep your devices and sensitive information safe, the best thing you can do is refrain from joining any public Wi-Fi networks.
“The instinct is that you’re going to jump on,” Liwer said. "Connectivity today is like water and oxygen, we can’t survive without it."
If you can't keep yourself from your online life, even for brief periods of time when you are traveling, there are a few other things you can do. You should make sure that the systems on your devices are up to date, and that they include software to protect from malicious networks.
Once you have such software installed, actually listen to it, said Liwer. If it tells you that a network is risky, don't join it. While it might be tempting to check your email, make a phone call or even upload a picture to Instagram, it could have unintended and costly consequences for your family or company.

What to do after connecting to a risky network

If you’re worried that you’ve joined a public network that might have left you vulnerable to a cyberattack, there are a few things you can do after the fact, Liwer said. First, establish if there is malware on your device and remove it.
Next, Liwer says to change all of your passwords to ones that are difficult to replicate, even if it's painful to do so.
“Your daughter’s name and her birthday is not a good password,” Liwer said.
His last piece of advice changes if you’re a private person or a corporation. Individuals should check to see if their identity has been stolen. For corporations, it’s a bit more complicated to detect if someone is using stolen corporate data. Liwer recommends using software to monitor suspicious behavior on the company server.
Liwer also said to be careful even if you are in an airport or city with a good cybersecurity score or ranking. Just because an area has been deemed low-risk doesn’t mean that hackers aren’t there, or won’t target that place in the future.
“When you are using public Wi-Fi networks, you should always consider your safety first,” said Liwer. "It’s a real threat, not a theoretical danger."

댓글

이 블로그의 인기 게시물

Week In Review: IoT, Security, Auto

Deals ArterisIP  inked a  deal  with  Mobileye , which has bought multiple licenses for ArterisIP’s interconnect and resilience technology for functional safety and AI hardware acceleration. Mobileye, which was purchased by Intel last year for $15.3 billion, will use the technology for ISO 26262/ASIL B and D SoCs. Siemens  agreed to operate its MindSphere digital operating system on  Alibaba Cloud , helping to connect Internet of Things devices in China. MindSphere was previously available only on  Amazon Web Services  and  Microsoft Azure . SAP  is teaming with  Suning Holdings Group  for joint research in artificial intelligence, big data, blockchain, cloud computing, and IoT technology for use in China’s financial, retail and sports sectors. In addition,  Suning Logistics  closed a self-driving partnership agreement with  Baidu  to use the open-source Apollo technology for logistics devel...

Six Tools Used by Hackers to Steal Cryptocurrency: How to Protect Wallets

In the early July, it was  reported  that Bleeping Computer detected suspicious activity targeted at defrauding 2.3 million Bitcoin wallets, which they found to be under threat of being hacked. The attackers used malware — known as “clipboard hijackers” — which operates in the clipboard and can potentially replace the copied wallet address with one of the attackers. The threat of hacking attacks of this type has been  predicted  by Kaspersky Lab as early as November of last year, and they did not take long to become reality. For the time being, this is one of the most widespread types of attacks that is aimed at stealing users’ information or money, with the overall estimated share of attacks to individual accounts and wallets being about 20 percent of the total number of malware attacks. And there’s more. On July 12, Cointelegraph  published  Kaspersky Lab’s report, which stated that criminals were able to steal more than $9 million in  Ethere...

Alibaba Opens Robot Restaurant as Automation Expands Around the Globe

https://thespoon.tech/alibaba-opens-robot-restaurant-as-automation-expands-around-the-globe/ Alibaba has opened up a  highly automated restaurant  in Shanghai, as robots continue to enter eateries around the globe.  The Robot.he restaurant in the Hema supermarket uses a series of apps, QR codes, and robots to provide a futuristic dining experience (hat tip to  Axios ). The Hema app tells customers where to sit in the restaurant and is used to pay for meals as well as to order more food once seated. Once the food is ready, small pod-like robots scurry out on shiny tracks to deliver it straight to the table.  While there is a ton of technology at play here, Hema still relies on humans for much of the work. From the video (see below), staff on-hand helps with the selection of seafood, and there are human cooks making the meals. Alibaba’s news site,  Alizila , didn’t say exactly when the restaurant opened, or provide much information regarding future...