Tips & tricks to use Free Virtual WiFi Router.

Things to Consider when Using Public WiFi

How does Encryption Work?

Encryption is the key to keeping your personal information secure online. Encryption scrambles the information you send over the internet into a code so it's not accessible to others. When you're using wireless networks, it's best to send personal information only if it's encrypted - either by an encrypted website or a secure WiFi network. An encrypted website protects only the information you send to and from that site. A secure wireless network encrypts all the information you send using that network.

How to Tell If a Website is Encrypted?

If you send email, share digital photos and videos, use social networks, or bank online, you're sending personal information over the internet. The information you share is stored on a server. To determine if a website is encrypted, look for https at the start of the web address (the "s" is for secure). Some websites use encryption only on the sign-in page, but if any part of your session isn't encrypted, your entire account could be vulnerable. Look for https on every page you visit, not just when you sign in.

What about Mobile Apps?

Unlike websites, mobile apps don't have a visible indicator like https. Researchers have found that many mobile apps don't encrypt information properly, so it's a bad idea to use certain types of mobile apps on unsecured WiFi. If you plan to use a mobile app to conduct sensitive transactions, use a secure wireless network or your phone's data network (often referred to as 3G or 4G). If you must use an unsecured wireless network for transactions, use the company's mobile website - where you can check for the https at the start of the web address - rather than the company's mobile app.

Never Assume a WiFi Hotspot is Secure

Most WiFi hotspots don't encrypt the information you send over the internet and aren't secure. In fact, if a network doesn't require a WPA or WPA2 password, it's probably not secure.

If you use an unsecured network to log in to an unencrypted site - or a site that uses encryption only on the sign-in page - other users on the network can see what you see and what you send. They could hijack your session and log in as you. New hacking tools - available for free online - make this easy, even for users with limited technical know-how. Your personal information, private documents, contacts, family photos, and even your login credentials could be up for grabs. An imposter could use your account to impersonate you and scam people in your contact lists. In addition, a hacker could test your username and password to try to gain access to other websites – including sites that store your financial information.

Related Topics:

More Useful Tips:

Back to Top