World Wi-Fi day is here – the tech that changed our lives and our privacy

Can you imagine what it would be like to not be able to connect to a Wi-Fi network at a train station, in the airport or at a restaurant? We got accustomed to using hotspots and wireless networks the same way we look at the clock to check what time it is.

Thanks to an Australian team of engineers led by John O’Sullivan, wireless networks clearly make our lives easier.

On World Wi-Fi Day, acknowledge this great invention! But remember to use wireless networks wisely. You can easily connect to a Wi-Fi without taking any additional painstaking. But the smart Wi-Fi practice is when you first make sure your device is secured.

Why would you need a secure Wi-Fi access? Because so far, as helpful as they may be, wireless networks have proven to be the most vulnerable when it comes to data hacking.

Check out 5 true stories that reveal how easy it is to steal digital data while connected to Wi-Fi.

1. Public Wi-Fis: from exposing your name and device to your whole life story

For the sake of experiments, Wouter Slootboon, a Dutch IT expert proved how public Wi-Fis are more unsecure than anyone could think. He went to different coffee shops and exposed the risks of using a public, free hotspot without having your device encrypted.

He was able to connect to the laptops, smartphones, and tablets of all the people present in onecafé. Slotboom was able to see the networks the devices were previously connected to. From this stage to finding out people’s passwords, personal emails and other important data from them it was just a matter of seconds.

In a different café, Slotboom’s next level went to creating a fictious Wi-Fi network and trick users into connecting to it, making them believe they were actually connecting to the open Wi-Fi of the café.

Here are some of Wouter’s observations:

‘We can also see the name (first and last) of a woman using the social bookmarking website Delicious. Delicious allows users to share websites—bookmarks—they are interested in.

First, we google her name, which immediately allows us to determine what she looks like and where in the coffeehouse she is sitting. We learn that she was born in a different European country and only recently moved to the Netherlands. Through Delicious we discover that she’s been visiting the website of a Dutch language course and she has bookmarked a website with information on the Dutch integration course.’

Read the whole story. 

2.  From hacking a faulty router to making a good deed

An Israeli hacker revealed how easy it is to hack a Wi-Fi network, particularly one set by town municipalities. Amihai Neiderman, who is actually a white hat hacker, is the manager of an Israeli cyber security firm. One day, he noticed an unusual wireless hotspot placed in an area where there were no buildings. So, he decided to check how secure it is. In a few minutes, he discovered a vulnerability in the router’s web interface that let him take control of the full device.

The good part is Neiderman reported the flaw to the router company that fixed the issue. Still, if someone else wanted to take advantage of the flaw, that person could have grabbed data from thousands of users.

3. An ordinary journalist’s data got hacked when he was about to expose a controversial privacy issue

An American journalist thought no one would ever want to steal his data because he was not such an interesting person and also because he believed he had nothing to hide. He suddenly became interesting when he was doing an investigation story related to Apple and FBI’s request for tech companies to create back doors, so terrorists would be caught easier.

His important journalistic data got hacked while being on a plane, using American Airlines Gogo. This is an in-flight internet connection that works exactly the same as most open Wi-Fi networks.

The resolution? Although he found out who hacked his laptop, he never knew if or what part of the stolen data the hacker ever used.

4. What’s the most satisfying way to get even with your ex-wife? Mess up with her Wi-Fi thermostat

Here is how an ex-husband wanted to revenge on his ex-wife after she decided to bring in her new boyfriend in the house they once owned together. Since he could still control the Wi-Fi thermostat through his mobile app, he started having fun with it. So, he used to set the home temperature to 80 degrees when they were away from home in the middle of June.

World #Wi-FiDay! Stay safe on public networks with a #VPN Click to Tweet
5.  Never downloaded any music or movies? You can still get a copyright notice from your ISP

Finally, this is the story of a woman who truly believed her home Wi-Fi network was 100% safe. When she decided to change her ISP, the company replaced it with one of their own. One year later, she received a notice letter from the ISP, accusing her of having illegally download a movie.

The only problem was she never downloaded or watched the named movie. She quickly changed her Wi-Fi password. However, the Motion Picture Association of America (MPAA), the company that initially sent a letter to her ISP could have still sued her for illegal copyright. She had to prove her wireless network was hacked.

More people whose data got hacked when using Wi-Fi:


And good pieces of advice:


Check this nice video simulating Wi-Fi data hacking in a cafe:

Why use a VPN each time you connect to a Wi-Fi?

A VPN encrypts your entire internet traffic, guaranteeing your privacy online. This means you are protected from data thefts. With a dedicated Wi-Fi Protection profile, CyberGhost secures you data on all Wi-Fi networks, including public, and open Wi-Fis.

So, the next time you connect to a Wi-Fi, remember to use CyberGhost VPN!

About the author

Dana Vioreanu
Dana Vioreanu

Even though her degree is in Sociology, which technically has nothing to do with writing, all her previous jobs implied working for websites, taking care of content and writing articles.
By the way, if you’re interested in studying abroad, feel free to ask her a few pointers, because for about two years and a half, she learned almost everything there is to know about international studies.

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>

© 2017 CyberGhost