02.11.2014 Views

untangling_the_web

untangling_the_web

untangling_the_web

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

DOCID: 4046925<br />

UNCLASSIFIEDiiFO~OfflelAL liSE m.L¥<br />

connection.!" In fact, if you use WiFi without encryption, expect that anyone and<br />

everyone can read everything you read and write, and track every move you make.<br />

You also need to be aware of <strong>the</strong> WiFi "evil twin" scenario, an attack that is<br />

remarkable both for its simplicity and its effectiveness. Here's how it works. The bad<br />

guy takes his laptop to a popular coffee shop where lots of people like to use <strong>the</strong><br />

Internet while enjoying a cup 0' joe. The bad guy has set up his computer to transmit<br />

a signal that turns his laptop into an Internet gateway or access point, one that looks<br />

and sounds remarkably legitimate. Here you come, mocha frappuccino in hand; you<br />

open your laptop, start searching for a local WiFi connection, and-bingo-in<br />

addition to that coffee shop's fee-for-service Mobile Hotspot, <strong>the</strong>re is a second<br />

option Cheap & Friendly Mobile Hotspot or maybe even a Free Mobile Hotspot. If<br />

you are like most people, you might well log into <strong>the</strong> cheap or free service, assuming<br />

<strong>the</strong>y are legitimate WiFi hotspots. And what happens if you do log into an evil twin<br />

WiFi access point? The bad guy will have software on his computer to capture every<br />

keystroke you make, so whatever you have entered once you've logged in, he now<br />

owns. And if you used a credit card to log into <strong>the</strong> cheap WiFi hotspot, <strong>the</strong> bad guy<br />

now has that. Even if you sent any encrypted data, such as a password, that's still<br />

probably not a problem for <strong>the</strong> bad guy because he also undoubtedly has software<br />

to break that, too.<br />

The problem is obvious: you don't want to fall prey to this evil twin attack, but how to<br />

avoid it and still use WiFi hotspots? Here are good suggestions from PCWorid<br />

Magazine:<br />

"Check Your Wi-Fi Settings: Many laptops are set to constantly search and log<br />

on to <strong>the</strong> nearest hotspot. While this option might seem convenient, it does not<br />

allow you to monitor which hotspots you are logging on to and determine if <strong>the</strong>y<br />

are legitimate. Turning off this option will prevent your computer from logging on<br />

to a hotspot without your knowledge.<br />

Pay Attention to Dialog Boxes: Pop-up warnings are <strong>the</strong>re for a reason-to<br />

protect you. If you are lucky enough to have not clicked <strong>the</strong> "never show this<br />

again" option, make sure you read <strong>the</strong>se warnings carefully before agreeing to<br />

send information.<br />

Use One of Your Credit Cards on <strong>the</strong> Web Only: Open a credit card account that<br />

is used solely for <strong>the</strong> purposes of shopping on <strong>the</strong> Web. Ideally, you should be<br />

able to access account records online so you don't have to wait for monthly<br />

statements to monitor any activity. "Be prepared to close that account on short<br />

notice if it's been compromised," says Schiller.<br />

Conduct Private Business in Private: "Maybe you don't need to move money<br />

around or check your bank statements when you are connected to a public<br />

175 David Pogue, "How Secure is Your WiFi Connection," Pogue's Posts, The New York Times, 4<br />

January 2007, , 16 January 2007.<br />

UNCLASSIFIEDHFOR OFFISIAL l-:JSE g~Jb¥ 523

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!