기본 콘텐츠로 건너뛰기

These are the 10 airports where you're most likely to be hacked

  • Millions of travelers are vulnerable to cyberattack if they join public Wi-Fi networks in airports, according to a new report by Coronet, a cybersecurity company. 
  • Here's what experts say to do to avoid cyberattack and what to do if you've joined a public Wi-Fi network in the past.
Sam Hodgson | Bloomberg | Getty Images
Travelers walk through San Diego International Airport in San Diego.

There's a bigger danger lurking in U.S. airports than mediocre meals: public Wi-Fi networks.
The convenience of these easy ways to connect online is often masked by the fact that many are unencrypted, insecure or improperly configured, according to a recent study by Coronet, a cybersecurity company. If that's the case, it is much easier for hackers to access your device and install malicious software, steal your passwords or login information and download other data such as emails.
Hacking, which includes phishing, ransomware, malware and skimming, is the most common type of data breach and accounts for 60 percent of attacks, according to a 2017 study by the Identity Theft Resource Center. These attacks can lead to identity theft, which along with debt collection, imposter scams and other kinds of fraud, cost consumers $905 million in total losses in 2017, according to the Federal Trade Commission.
To rank airports by their threat level, Coronet looked at data from the 45 busiest American airports over five months at the beginning of the year. Then, it assigned each airport a threat index score based on the vulnerability of devices and risk of networks used.
“The main reason airports are problematic is because most people are taking convenience over security,” said Dror Liwer, chief security officer and co-founder of Coronet.

These are the top 10 worst airports for cybersecurity 

Ranking
Airport
City
State
Threat Index Score
1San Diego International AirportSan DiegoCA10
2John Wayne Airport- Orange County AirportSanta AnaCA8.7
3William P Hobby AirportHoustonTX7.5
4Southwest Florida International AirportFort MyersFL7.1
5Newark Liberty International AirportNewark NJ7.1
6Dallas Love Field DallasTX6.8
7Phoenix Sky Harbor International AirportPhoenixAZ6.5
8Charlotte Douglas International AirportCharlotteNC6.4
9Detroit Metropolitan Wayne County AirportDetroitMI6.4
10General Edward Lawrence Logan International AirportBostonMA 6.4
Source: Coronet 

What's at risk on public Wi-Fi

There are three major things that you're putting at risk when connecting to a public Wi-Fi network, Liwer says.
1. Device
Many malicious public Wi-Fi networks look like any other network, according to Liwer. But when you click on ‘accept terms and conditions’ to join, you may be installing malware on your device.
2. Credentials
If you’ve connected to a dangerous network, you could be a target for Wi-Fi phishing. This is when a hacker makes a webpage that looks exactly like another one, such as the sign-in for your work email, according to the Federal Trade Commission. When you enter your username and password to access your email, you’re actually entering your information into a hacker’s site.
3. Data
This is especially important for business travelers who may be working on the go, Liwer said. If you are on a hacker’s network and transferring data to or from a coworker, it is all going through the attacker’s devices. He or she can then do with it what they please, said Liwer.

How to avoid a cyberattack

To keep your devices and sensitive information safe, the best thing you can do is refrain from joining any public Wi-Fi networks.
“The instinct is that you’re going to jump on,” Liwer said. "Connectivity today is like water and oxygen, we can’t survive without it."
If you can't keep yourself from your online life, even for brief periods of time when you are traveling, there are a few other things you can do. You should make sure that the systems on your devices are up to date, and that they include software to protect from malicious networks.
Once you have such software installed, actually listen to it, said Liwer. If it tells you that a network is risky, don't join it. While it might be tempting to check your email, make a phone call or even upload a picture to Instagram, it could have unintended and costly consequences for your family or company.

What to do after connecting to a risky network

If you’re worried that you’ve joined a public network that might have left you vulnerable to a cyberattack, there are a few things you can do after the fact, Liwer said. First, establish if there is malware on your device and remove it.
Next, Liwer says to change all of your passwords to ones that are difficult to replicate, even if it's painful to do so.
“Your daughter’s name and her birthday is not a good password,” Liwer said.
His last piece of advice changes if you’re a private person or a corporation. Individuals should check to see if their identity has been stolen. For corporations, it’s a bit more complicated to detect if someone is using stolen corporate data. Liwer recommends using software to monitor suspicious behavior on the company server.
Liwer also said to be careful even if you are in an airport or city with a good cybersecurity score or ranking. Just because an area has been deemed low-risk doesn’t mean that hackers aren’t there, or won’t target that place in the future.
“When you are using public Wi-Fi networks, you should always consider your safety first,” said Liwer. "It’s a real threat, not a theoretical danger."

댓글

이 블로그의 인기 게시물

Six Tools Used by Hackers to Steal Cryptocurrency: How to Protect Wallets

In the early July, it was  reported  that Bleeping Computer detected suspicious activity targeted at defrauding 2.3 million Bitcoin wallets, which they found to be under threat of being hacked. The attackers used malware — known as “clipboard hijackers” — which operates in the clipboard and can potentially replace the copied wallet address with one of the attackers. The threat of hacking attacks of this type has been  predicted  by Kaspersky Lab as early as November of last year, and they did not take long to become reality. For the time being, this is one of the most widespread types of attacks that is aimed at stealing users’ information or money, with the overall estimated share of attacks to individual accounts and wallets being about 20 percent of the total number of malware attacks. And there’s more. On July 12, Cointelegraph  published  Kaspersky Lab’s report, which stated that criminals were able to steal more than $9 million in  Ethere...

BLACK LABEL, Joined CeBIT 2018 hosted in Hanover, Germany

South Korean IT Companies Target the European Digital Market -  KOTRA operates the unified Korean pavilion for Hanover Information Communication Exhibition 2018 ... 56 companies in total. Black Label participated with IoT module and IoT product developed directly at CeBIT 2018 in Hanover, Germany. Click on the blog link below for a list of government press releases and participating companies. 한국 IT 기업들 , 유럽 디지털 시장 공략 -KOTRA, 2018 독일 하노버 정보통신전시회 (CeBIT 2018) 통합 한국관 운영 ... 총 56 개사 참가 블랙라벨이 독일 하노버에서 열린 CeBIT 2018에 직접 개발한  IoT 모듈과 IoT 제품을 가지고 참가했습니다. 아래의 블로그 링크를 클릭하시면 정부보도자료와 참가업체 리스트를 확인하실 수 있습니다. http://blog.daum.net/htiger31/18387695 블랙라벨 관련 문의사항 HP: 010-9818-3511 / 이메일:  uklim72@gmail.com 블랙라벨 홈페이지  https://blacklabel.io/index.do

Keeping Smart Homes Safe And Secure

Bad actors are increasingly targeting connected devices, and network providers are fighting back. But when it comes to protecting the IoT, a one-size-fits-all approach simply doesn’t fit. The security measures that protect IoT devices in business settings don’t readily translate to devices in consumers’ homes, says Marcio Avillez, SVP of networks at CUJO AI. In the latest Intelligence of Things Tracker, Avillez makes a case for taking a device-specific approach in thwarting threats to smart homes. Consumers often find the promise of greater convenience to be a convincing reason to buy connected devices. Unfortunately, reports of breached connected devices are all too frequent, and consumers may find they are introducing not just connectivity, but also bad actors, into their homes. IoT-related breaches are innumerable. In 2017, the FBI  warned  consumers against purchasing IoT-connected toys, stating that such devices could be hacked and used to record and spy on c...