Concern over open Wi-Fi in host cities of the World Cup



[ad_1]

Traffic encryption and large-scale events make wireless networks easy targets for criminal attacks

No less than 7,176 of the 32,000 public Wi-Fi networks of host cities of the 2018 World Cup do not use traffic encryption. in search of Kaspersky Lab. This makes them potentially dangerous to use, and fans should take care of their personal data, especially using open Wi-Fi connections around Fifa World Cup games.

Global events always involve a concentration of people connecting to message networks, staying in touch with your loved ones and sharing the fun with others.

However, at the same time, these networks can be used to transfer financial information and other valuable information over the Internet. And it is this information that third parties – not necessarily criminals – can intercept and use for their own purposes.

The results of Kaspersky Lab are based on an badysis of public Wi-Fi spots in 11 host cities of the 2018 World Cup including Saransk, Samara, Nizhny Novgorod, Kazan, Volgograd, Moscow, Ekaterinburg, Sochi, Rostov, Kaliningrad and St. Petersburg. The results show that all wireless access points do not yet have encryption and authentication algorithms, which are essential for Wi-Fi networks to remain secure. This means that hackers should only be located near a point of access to intercept network traffic and obtain confidential information from unintentional or unprepared users.

Unreliable networks

The three cities with the highest percentage of unreliable Wi-Fi networks Saint Petersburg (37%), Kaliningrad (35%) and Rostov (32%). In contrast, the safest places were relatively small cities – including Saransk (only 10% of Wi-Fi points are open) and Samara (17% of Wi-Fi points are open).

Nearly two-thirds of all public Wi-Fi networks in these locations use the WPA / WPA2 (Wi-Fi Protected Access) protocol family for encrypting traffic, a protocol considered one of the most However, it should be noted that even reliable WPA / WPA2 networks may allow brute force and dictionary attacks, as well as key reinstallation attacks, which means that they do not are not absolutely secure.

– Kaspersky Lab

[ad_2]
Source link