ComLuv

CommentLuv authors show their wares

  • Home
  • Guest Bloggers
  • Help Desk
  • Download
    • CommentLuv WordPress
    • CommentLuv Blogger
    • TwitterLink Comments
  • Write for us
You are here: Home / Guest Bloggers / Identity Theft through Wireless Networks – How does it happen

Identity Theft through Wireless Networks – How does it happen

July 27, 2013 by Joy Leave a Comment

Post Views for May : 6
  • Bio
  • Twitter
  • Google+
  • Latest Posts
  • Write For Us
Joy

Joy

Joy Mali is an active blogger who is fond of sharing interesting finance related articles to encourage people to manage and protect their finances. Follow her to know on how to prevent identity theft and other scam.
Joy

@wbider

Follow @wbider
Joy

+Joy

Joy

Latest posts by Joy (see all)

  • Online Safety: Do you have a secure wireless router? - December 1, 2013
  • Identity Theft through Wireless Networks – How does it happen - July 27, 2013
  • Can Apps be used to steal Your Personal Information? - May 17, 2013
Joy
You can get your own content published on this site as long as you have CommentLuv installed on your site.

Doing so means you get exposure to thousands and thousands of other CommentLuv users and your posts get sent out to the massive subscriber list.

Google loves this site and indexes it multiple times per day and posts always get lots of comments so you can be sure of some excellent exposure.

See the Write For Us page for more details

btw.. you can get this author box here

wifi network

Accessing the web from any location has become even more possible with the prevalent use of wireless networks. You can easily find Wi-Fi hotspots in coffee shops, malls and hotels which you can use to connect to the Internet. Many offices are using wireless networks as well to easily share their Internet connection among company workstations. These days, most homes also set up their own wireless networks to enable several gadgets to have access to the web. Some homes have multiple computer systems, laptops, tablets and smartphones so sharing Internet connection through wireless means is very ideal.

Setting up a wireless network is also pretty affordable and easy: all you need is a good Internet connection and a router. You can set up your network on your own or ask your provider to do it for you. Because it’s cheaper to set up a wireless network, a lot of businesses offer free Wi-Fi as a standard service perk when you patronize their establishments. It’s also a good way to attract more customers to visit their businesses because they have free Internet.

However, these wireless networks have opened a venue for criminals to easily commit identity theft. People don’t realize the dangers of using a wireless connection because they consider it as convenient. Unfortunately, this is one of the main reasons why some people fall prey to ID theft and fraud. Using an unsecured network when dealing with sensitive information isn’t safe; instead, you’re only inviting hackers to intercept and steal your personal and financial data when you do so.

A criminal doesn’t need a lot of your personal information to commit ID theft. Basic information like your full name, date of birth, social security number, address, past employers, and the high school you attended can all be used by the criminal to establish a new line of credit under your name or to access all of your accounts. Unfortunately, these details are among the data you send out when you’re using the Internet, making it easier for hackers to steal your identity and use it for fraudulent activities.

You should be aware that using Wi-Fi hotspots to connect your tablet, smartphone and laptop to the Internet is in itself very risky; and by making bank transactions using these gadgets, you’re only increasing the risk of becoming a victim of ID theft through gadgets. This is because portable devices such as phones and tablets have little protection against spyware and viruses, not to mention Wi-Fi hotspots are a hotbed of activity for cyber criminals.

But how do hackers commit identity theft through wireless networks? Here are some of the methods they use:

wifi security

Hacking unsecure/secure wireless networks

Wireless connections that are visible, unencrypted, don’t use passwords, and have no security in place are the easiest targets. A hacker can scan for available networks, focus on one or several of these networks, hack the network, and access all the computers and gadgets using the connection. He can then intercept and steal all data that pass through the network, from email login information, contact

details and social security numbers to banking information. On the other hand, secure networks can also be hacked by cyber criminals if they have the right set of tools and skills to do so.

Creating fake wireless networks

Fraudsters can also create a “twin” wireless network that looks just like the wireless connection offered at several public places such as cafes, malls, terminals and hotels. Wi-Fi hotspots at locations like these attract hackers because of the amount of users surfing on unsecure connections. The criminal monitors all data that pass through the network, especially email and bank account passwords, credit card numbers and other personal information.

Creating fake login pages

Another way criminals obtain information about you is by creating fake pages that ask for details like your address, date of birth, credit card number or other banking information. These details alone can be used by swindlers to commit ID theft or fraud.

Using social networking sites to find a victim

As far-fetched as it sounds, criminals are now using social sites to find their targets. Most people are not aware that posting about their vacation plans on these sites make them prime targets of identity thieves. They’re unconsciously broadcasting that they won’t be as focused as they usually are about monitoring their credit card bills for suspicious activities. Schemers also know that travellers are good targets for ID theft because they’re distracted with their travel plans. They’re also using wireless networks (both secure and unsecure ones) a lot to access their social accounts, emails or even bank accounts.

Even with the rise in identity theft cases (reaching about 9.9 million victims a year), it’s possible to avoid becoming a victim of ID theft. Here are some ways to protect from ID theft when using wireless networks:

  • When setting up your wireless home network, use devices with WPA (Wi-Fi protected access) or WEP (wired equivalent privacy) protocol encryption technology. This lowers the chances of your network getting hacked.
  • Install a personal firewall in your network and disable file-sharing. In case someone hacks into your network (or is piggybacking on your connection), he won’t be able to access your computer or any computer within the network if you limit access to folders.
  • When accessing the Internet using Wi-Fi hotspots, never make bank transactions or do anything that requires you to send sensitive data because hackers will intercept and steal this information to commit identity fraud and theft.
  • As much as possible, avoid connecting to free Wi-Fi as hackers tend to focus their attention on wireless networks with a lot of users.
  • Use identity monitoring and credit monitoring. Closely monitoring your credit can help you spot suspicious and fraudulent activities in your accounts. Usually, such activities also indicate ID theft, so paying for professional identity and credit monitoring services would be ideal especially if you won’t be able to regularly check your credit.

To minimize the risk of becoming a victim of identity theft, you have to make sure that your wireless home network is secure, and that you don’t make bank transactions or deal with sensitive information when you’re using public Wi-Fi. You don’t have to be tech savvy to do these; you just have to know and follow the ways to protect from ID theft.

Are you a victim of ID theft or fraud? Share your story by leaving a comment below.

Related Posts
Why your business must go Social
Why your business must go Social
Photo Credit - Roger H. Goun under a Creative Commons Attribution License.
Journalism and its Future in the Digital Age
Promote Your Dental Clinic Using the Internet
Promote Your Dental Clinic Using the Internet
http://i.imgur.com/TjJLj.jpg
5 Signs of Obsessive Compulsive Social Media Disorder
Own Your Content Channels (Why Email Is An Old Friend)
Own Your Content Channels (Why Email Is An
prev next
Filed Under: Guest Bloggers, technology Tagged With: identity thefts, protect your account, Social Media, wifi, wireless
Tweet
PinIt

Subscribe To Updates






Popular Categories

  • Blogging (338)
  • Tutorials (162)
  • Newsletter (153)
  • Health & Fitness (139)
  • Hints and Tips (126)
  • Business (123)
  • Lifestyle (105)
  • SEO (103)
  • Marketing (101)
  • technology (100)

Choose a Category

Do You Like CommentLuv?

CommentLuv on G+

Recent Comments

Haha... You are right.. Agree with you.... Thank...
I am soon going to start a top 10 list blog becaus...
Your comment is awaiting moderation. Of course,...
Thanks for sharing the tip Troy. I have never thou...
I love the idea you mentioned of using I again and...
Shouldn't you be able to show you are unique by po...
Nowadays finding a profitable niche is a very diff...
In my opinion SEO , consistancy and social media a...
I think youtube is the best medium to increase soc...
I think youtube is best medium to increase social ...

Featured Video


EasyAzon Plugin

CommentLuv Offer
godaddy vouchers

Return to top of page

Using News Theme on The Genesis Framework ·Copyright © 2015 · Log in