4 secrets that do not want to know the Wi-Fi hackers

You are using wireless networks that are encrypted to be safe, right? Error! Hackers want you to believe that you are so protected to stay vulnerable to their attacks.wifi hackers

Below you will find 4 things that wireless network hackers are hoping you will not know:

1. WEP encryption is useless to protect your wireless network.

WEP can easily break into a few minutes and essentially provides users with a false sense of security.

Even an average hacker can crack the Wired Equivalent (WEP), within minutes, rendering it virtually useless as a protection mechanism.

Many owners of their old wireless routers never bothered to change the encryption of their WEP wireless network to the newer and strongest WPA2 security.
Setting up your router in WPA2 is a pretty simple process. Visit the manufacturer's website for instructions on changing settings or updating the firmware.

It should be mentioned that even WPA2 encryption can be broken. It is more difficult but it can be done, especially if you are not using s with many letters. The size (length) of the code matters.

2. Using MAC filters in your router will not help prevent unauthorized devices from being connected

Every computer, every game system, every printer, etc., has a unique MAC (hard-coded) address. This address is "seen" by your router. So there are many routers that allow you to deny access from a device's MAC address.

The router reads the MAC address of the device that is going to connect to your network and compares it with the list of allowed or banned connections.

This sounds like a very good security mechanism, but the problem is that hackers can fool the router using false MAC addresses that match what you allow.

All they have to do is use a packet logger to "listen" to the wireless traffic. This way they can record which MAC addresses are allowed to connect to the network. They then give their device a MAC address that matches one of the allowed ones.

3. Turning off your router's remote management capability is a very effective hacker protection measure

Many routers have a setting that allows you to manage via a wireless connection from your browser. This means that you can access all the router security settings and other features without having to be on the computer that is connected to the router using an Ethernet cable.

Although it is convenient because it allows you to manage the router remotely, it provides an entry point to hackers who want your security settings.

There are too many who never change the factory manager passwords to their router, which makes things even easier for hackers.

It is advisable not to allow wireless connection to your router management panel. Only allow connections to the panel via an Ethernet cable.

Of course, it is superfluous to mention that you should change all laboratory settings immediately.

4. If you use public hotspots, you are an easy target for man-in-the-middle and session hijacking attacks

Hackers use tools like this Firesheep and AirJack to perform “man-in-the-middle” attacks. So they can get between your computer and the connection you use and collect passwords, read them you, and more.

Using tools like SSL Strip can also get passwords from secure websites you visit.

You can avoid unpleasant situations like the above using a VPN service provider to protect your traffic when using wi-fi networks.
A secure VPN provides an extra level of security that is extremely difficult to break. Not that it can not break, just hackers will choose an easier goal.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.100 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).