Step-by-Step Guide

Step 1: Understand what there is to lose and who's stealing the loot

When we're inside a coffee shop or any other public hotspot including airports and hotels, there's a lot of "juicy" wireless communication going on -- most of which is very easily intercepted. There's so much for us to lose and for the bad guys to gain in the form of e-mail, instant messages, files stored on laptop drives and more. The possibilities are endless. They include identity theft, loss of sensitive corporate information and the installation of malicious software that tracks our every action on the computer. What about that person who blackmails you when he finds some dirt on you? Something like that can be a real life-changing event!

When it comes to the people who are actually doing the bad stuff, you may be surprised. A hacker, we tend to think, is the stereotypical pimple-faced teenager pecking away on a keyboard in a school lab instead of that nicely dressed young man sipping a latte at the table next to us in the local coffee shop. The truth is that we don't really know who is out there poking and prodding our computers maliciously. However, based on people I've seen and heard -- even from self-proclaimed security professionals -- a lot of people are doing bad things to other people's unsecured data in hotspot settings.

Malicious intruders who have nothing better to do can easily listen in on instant messaging (IM) conversations. They can watch Web browsing in real time, and they can even poke around on unsuspecting users' computers. Given how simple

Requires Free Membership to View

these attacks are to carry out, it's amazing that most people are not doing anything about it.


How to lock down laptops that connect to hotspots

 Home: Introduction
 Step 1: Understand what there is to lose and who's stealing the loot
 Step 2: Secure your computer to prevent attacks in the first place
 Step 3: Secure your communications link
 Step 4: Tools you can use to test if you're vulnerable

ABOUT THE AUTHOR:
Kevin Beaver
Kevin Beaver is an independent information security advisor with Atlanta-based Principle Logic LLC. He has more than 17 years of experience in IT and specializes in performing information security assessments. He has authored five information security-related books including Hacking For Dummies (Wiley), the brand new Hacking Wireless Networks For Dummies, and The Practical Guide to HIPAA Privacy and Security Compliance (Auerbach). You can reach Kevin Beaver at kbeaver@principlelogic.com.
Copyright 2005 TechTarget

This was first published in August 2005

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: