Connect with us

Technology

Mistakes to avoid if you just have to use public Wi-Fi

Published

on

Mistakes to avoid if you just have to use public Wi-Fi

Sometimes, we find ourselves in a situation where we urgently need an internet connection, but we are not at home or at work. We might want to do some online tasks, such as checking our email, browsing social media, or streaming our favorite show. However, what if the only available option is a public Wi-Fi network that we are not familiar with? How can we use it safely without exposing our privacy and security?

CLICK TO GET KURT’S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS, AND EASY HOW-TO’S TO MAKE YOU SMARTER

Free Wi-Fi sign (Kurt “CyberGuy” Knutsson)

This is a dilemma that many people face, even those who are experts in cybersecurity. Case in point, Blackhat, the world’s largest hacker conference held annually in Las Vegas, brings together thousands of cybersecurity professionals from all over the world. They attend the conference to learn about the latest cyberthreats and solutions. But even these skilled professionals can fall victim to the hazards of public Wi-Fi.

Blackhat convention (Blackhat) (Kurt “CyberGuy” Knutsson)

Advertisement

The event organizers have a playful way of exposing this vulnerability. They monitor the network traffic and display the names of those who have been tricked by a fake or compromised Wi-Fi hotspot. This is the notorious “Wall of Sheep.”

The Wall of Sheep showcases the unfortunate consequences of network security negligence. The people on this wall are not willing participants, but careless attendees whose private data was captured and revealed to everyone.

These stories should serve as a stark warning to anyone who is concerned about the potential pitfalls of using public Wi-Fi. Even the most experienced cybersecurity professionals can be vulnerable to unsecured networks.

Illustration of data and a hacker (Kurt “CyberGuy” Knutsson)

MORE: 5 WAYS TO SECURELY ACCESS WI-FI ON YOUR PHONE WHILE TRAVELING

Advertisement

Real-life examples of hackers’ victims at Blackhat

You may wonder what the big deal is about ending up on the Wall of Sheep, but it can be far worse. Some of the horror stories include:

The hotel hotspot trap

One attendee checked into a nearby hotel during Blackhat week and decided to catch up on work using the hotel’s open Wi-Fi network. Unbeknownst to them, a hacker had set up a rogue hotspot, mirroring the hotel’s official network. The hacker intercepted the attendee’s login credentials and gained access to sensitive work emails and confidential documents.

The overconfident developer

A seasoned developer known for his coding skills headed to Blackhat thinking he was invincible. He ignored warnings and connected to a rogue network named “SecureConferenceWiFi.” Confident in his skills, he used the same weak password for all his accounts. Little did he know that his email and social media accounts were compromised. This turned out to be an embarrassing leak of sensitive project data and personal conversations.

The crypto investor’s nightmare

There was also a crypto investor who attended to participate in discussions about blockchain technology. During the conference, he went to access his online wallet and entered his passphrase on an unsecured network. Within minutes, a hacker intercepted his credentials and emptied his wallet, leaving him penniless and devastated.

Illustration of Wi-Fi being used (Kurt “CyberGuy” Knutsson)

Advertisement

MORE: HOW TO CHECK IF SOMEONE IS STEALING YOUR WI-FI

You become sitting prey the moment you connect to a typical public Wi-Fi hotspot

Unless you’re using a VPN service, even locked or secured public Wi-Fi networks are not completely safe. Public Wi-Fi hotspots are usually free or secured Wi-Fi networks available in public spaces like shopping malls, libraries, coffee shops, airports and hotels, to name a few.

Scam hotspots are historically easily identified by generic names like “Free Wifi” to lure people to connect to their networks. Cybercriminals have gotten savvier by using similar names of popular legitimate hotspots. If you aren’t paying close attention, you will be the next victim.

Preventative tactics for avoiding bad public Wi-Fi hotspots

  • Most public Wi-Fi hotspots in the US don’t require payment information, so that’s a red flag that a hacker might be trying to steal personal and financial information from you.
  • Regardless of how it is named, most closed networks have a lock symbol indicating a Wi-Fi network that is more secure with the password available for patrons or provided by the establishment.
  • Usually, legitimate public networks have a prompt that shows up in your browser that asks you to agree to terms and conditions of use while on their network too.
  • Pay attention to the website address you’re going to:
    Most websites, especially those with sensitive data, usually employ their own encryption techniques, so they will likely have HTTPS in the web address so you can always check your URL before logging in.For example: HTTPS://www.paypal.com not HTTP://www.paypal.com. Sometimes browsers autofill commonly visited sites, but you can then click on the web address bar at the top or bottom of your browser and read how the URL is actually showing up once you are directed there.

    Pay attention to the spelling of the website – there can be similar sites made to look like official sites. Could be ‘bannkofamerica’ instead of ‘bankofamerica.com’

  • Most websites, especially those with sensitive data, usually employ their own encryption techniques, so they will likely have HTTPS in the web address so you can always check your URL before logging in.For example: HTTPS://www.paypal.com not HTTP://www.paypal.com. Sometimes browsers autofill commonly visited sites, but you can then click on the web address bar at the top or bottom of your browser and read how the URL is actually showing up once you are directed there.
  • For example: HTTPS://www.paypal.com not HTTP://www.paypal.com. Sometimes browsers autofill commonly visited sites, but you can then click on the web address bar at the top or bottom of your browser and read how the URL is actually showing up once you are directed there.
  • Pay attention to the spelling of the website – there can be similar sites made to look like official sites. Could be ‘bannkofamerica’ instead of ‘bankofamerica.com’

Of course, you don’t have control over every scenario, and maybe using a public Wi-Fi hotspot is your last but necessary resort, especially while traveling. With a secure VPN service, you connect to a public Wi-Fi network without much worry. See my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android & iOS devices.

A person using Wi-Fi on their laptop (Kurt “CyberGuy” Knutsson)

MORE: CLEVER TRICK TO MAKE A CONNECTION FASTER ON YOUR WI-FI NETWORK

Advertisement

5 common attacks on people using public Wi-Fi

1) ‘Evil twin’ attacks

Imagine being at your favorite coffee shop and connecting to what appears to be their free Wi-Fi network. When you begin to browse the web, you are completely unaware that you’ve fallen victim to an “evil twin attack” as hackers have set up a malicious hotspot with the same name as a legitimate network. The attacker is now able to intercept data, steal your login credentials, and launch further attacks.

Solution

When you use a VPN service, it establishes a level of encryption between the end-user and a website regardless of what network you join, so any intercepted data cannot be read by the hacker without a correct decryption key.

2) ‘Man-in-the-middle’ attacks (MITM)

“Man-in-the-middle” attackers position themselves between your device and the intended server. Unbeknownst to you, this allows them to intercept all data traffic, including every email, chat message, or login attempt. Your sensitive data, private conversations, and financial transactions are now all available to them.

Solution

Advertisement

Because VPN services encrypt your data, even if hackers intercept your data, it isn’t accessible to them. VPN services work both for your personal computer and mobile devices, which means the protection of a VPN service can travel anywhere you go.

3) The ‘packet sniffing’ hack (Software reads your data)

Whenever you connect to any network, your devices send data packets that can be read by free software, such as Wireshark. When you’re on an unencrypted network, hackers can use free software, such as Wireshark, to read those data packets. Ironically, with such software, you can analyze web traffic to find security problems and vulnerabilities that need to be fixed or exploited.

Solution

Even though hackers can still see that there are data packets being sent, if you’re using a VPN, your data is traveling through a secure and encrypted tunnel, protecting against exposure and use by hackers. Because your data is encrypted, it renders your information virtually useless to hackers. And because they can see that you’re connecting via a VPN service, hackers can see that you would be harder to hack.

4) The ‘sidejacking’ hack

When a hacker employs the sidejacking technique, they essentially take the information gleaned from packet sniffing to be used in real-time, usually on-location, to exploit its victim. Once intercepted, the data is then used to gain access to the original destination website or app.

Advertisement

The hacker uses packet sniffing to read network traffic and ‘steal cookies.’ Cookies are files that a website stores on your mobile phone, tablet, or computer as you browse the web. Cookies store a variety of information, from language preferences to personal data such as name, physical address, or email address.

This allows websites to customize your experience. Once hackers find nonsecure socket layer cookies (just HTTP:// not HTTPS://), the information sent to the website or app by you is then captured. This allows the hacker to use what is captured to exploit private information and gain access to this and other sites.

Solution

Hackers scan web traffic to spot unencrypted or exploitable encrypted data, so having a secure VPN service most likely takes your data ‘out of the running’ for most hackers as they can see it is encrypted. And even if they do try, information going from and to your device is encrypted, so they will likely be unable to access the information itself.

5) Malware infection

Public Wi-Fi networks are often secured poorly or entirely unsecured. This allows cybercriminals the ability to infect your device with various forms of malicious software, including spyware and ransomware. Once infected, your data is at risk of theft or encryption. Your device can also be turned into a puppet for remote control.

Advertisement

Solution

If you forget to turn on your VPN service while out and about, you might panic at the thought of all the potential compromises outlined above. If, however, you’re running an antivirus program in the background of your device, you’d still be protected should a hacker infiltrate your device. Having antivirus software on your devices will make sure you are stopped from clicking on any potential malicious links, which may install malware on your devices and allow hackers to gain access to your personal information. Find my review of Best Antivirus Protection here.

A woman using a laptop (Kurt “CyberGuy” Knutsson)

Kurt’s key takeaways

Understanding the risks and taking precautions while using public Wi-Fi can protect you and your data. Keep in mind that using your cell phone and its data network should be your preference if a login is required or if you will be sharing personal or financial data. Remember that unless you are in Las Vegas at Blackhat, you won’t find yourself on a “Wall of Sheep,” but it could be something much worse.

Have you ever encountered a risky situation while using public Wi-Fi? If so, how did you handle it? Let us know by writing us at Cyberguy.com/Contact.

Advertisement

For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you’d like us to cover.

Answers to the most asked CyberGuy questions:

Copyright 2024 CyberGuy.com. All rights reserved.

Advertisement

Technology

The future of local TV news has taken a Trumpian turn

Published

on

The future of local TV news has taken a Trumpian turn

This is The Stepback, a weekly newsletter breaking down one essential story from the tech world. For more stories on Big Tech versus politics in Washington, DC, follow Tina Nguyen and read Regulator. The Stepback arrives in our subscribers’ inboxes at 8AM ET. Opt in for The Stepback here.

A long time ago, in 2004, the Federal Communications Commission laid down a rule designed to prevent a monopoly: No one company could broadcast to more than 39 percent of all the TV households in the United States. But then Donald Trump returned to the White House in 2025. Brendan Carr became FCC chairman and immediately kicked off a deregulatory initiative called “Delete, Delete, Delete,” in which Carr vowed to get rid of “every rule, regulation, or guidance document” that placed “unnecessary regulatory burdens” on companies. And within months, Nexstar, which already owned over 200 stations nationwide and had hit its ownership cap, announced that it had entered an agreement to purchase its rival, Tegna, for an estimated $6.2 billion — something that could only happen, however, if Carr agreed to change the FCC’s rules.

If you ask Nexstar why it’s pursuing a merger that would give it control of over 80 percent of the market, it’d point to Big Tech as the culprit. As advertisers take their money to Netflix, YouTube, and other digital streamers, linear television — the local television news, the broadcast affiliates, the basic cable networks — has suffered, forcing them to consolidate and shut down newsrooms. In that sense, Nexstar argued, the merger would help it compete for ad revenue with the streaming services, thereby building more robust local journalism. However, the merger’s opponents believe that this is a basic violation of antitrust laws and principles — not to mention the danger of letting one company have editorial control over the vast majority of America’s local television newsrooms.

But the second Trump administration handles regulatory hurdles a little differently than others, and companies have found that it’s faster to get what they want if they bypass the agencies and talk (read: suck up) to Trump directly. And when Nexstar did so publicly, it confirmed its opponents’ fears about political influence. Last September, in the fraught weeks after the fatal shooting of Charlie Kirk, Nexstar announced it would no longer broadcast Jimmy Kimmel Live! — a response to Carr’s claim that the FCC could revoke the broadcast licenses of TV stations that aired the comedian’s comments related to Kirk. It briefly led to ABC suspending Kimmel’s show, though ABC and Nexstar soon reversed their decision after a massive nationwide backlash and an ABC boycott.

However, Nexstar’s loyalty to Trump himself was not enough to win over his most powerful MAGA supporters. Newsmax, a cable news network with a deeply pro-Trump bent, and its CEO, longtime Trump donor and outside adviser Chris Ruddy, filed a lawsuit objecting to the merger, claiming that Nexstar’s anticompetitive behavior would force channels like his off the air with steeper carriage fees. He specifically accused Nexstar of jacking up the fees for stations to carry Newsmax, while offering its similar network, NewsNation, for much cheaper.

Advertisement

The Nexstar-Tegna MAGA makeover then took a more subtle turn. NewsNation hired the pro-Trump Fox News commentator Katie Pavlich and gave her her own primetime show. (The network had already hired a slew of former Fox journalists as well.) Around this time, a political group called Keep News Local began airing ads in DC that seemed to directly address Trump, praising him for having “defeated the fake news monopolies before through independent voices and local news” and claiming that the Nexstar-Tegna merger was “crucial for MAGA to survive.” (A little self-contradictory and mildly illogical, but it’s the kind of stuff that Trump likes to hear.) When I last spoke to Ruddy in February, I asked if he’d worried that the dark money going into Keep News Local would sway Trump, and he chose his words carefully: “I think at the end of the day, Trump makes up his own mind. I’m not sure he’s going to be influenced by an ad campaign.”

For months, no one could accurately predict if Trump would override Carr’s wishes and bless the deal, as he’s often done for other companies facing regulatory scrutiny. Trump’s Truth Social posts about the merger have been a good indicator of how precarious the merger has been and who’s been able to influence him at any given moment: Last November, he blasted the deal as an “EXPANSION OF THE FAKE NEWS NETWORKS,” but by February, he posted that the deal would “help knock out the Fake News because there will be more competition.”

Several current and former NewsNation employees told Status at the time that they feared that the parent company was steering NewsNation away from the centrist, “unbiased” reputation they’d long cultivated. “A lot of people within the network believe that the network has gone hard right to appeal to Trump and Brendan Carr,” one former employee told Status. Coincidentally, days before the deal was finalized, NewsNation began ramping up its explicitly pro-Trump content, tweeting a clip of CNN’s Kaitlan Collins being berated by White House press secretary Karoline Leavitt, along with the comment “Just going to leave this here.”

When Trump greenlit the merger in mid-March, but before the FCC’s three commissioners could vote on whether to waive the ownership cap, Nexstar and Tegna immediately announced a new complication: Tegna and Nexstar had already started merging. Tegna was no more and CEO Mike Steib had already sold $22.6 million of his company stock.

In response, eight state attorneys general and satellite TV operator DirectTV, which had already been planning to file separate federal antitrust suits against the merger, asked US District Judge Troy Nunley in Sacramento for an emergency restraining order that would prevent Nexstar from taking over Tegna’s assets. The order was granted on March 27th and on April 17, Nunley issued a formal injunction, ruling that Tegna must be operated as an independent financial entity, and Nexstar must take steps to ensure it remains separate from Tegna before further legal proceedings.

Advertisement

For now, Nunley has allowed the states and DirecTV to combine their cases, in which both argue that the merger was a clear violation of antitrust laws and would crush news competition.

Meanwhile, Republicans and Democrats in Congress are furious at Carr. On March 30th, Sens. Ted Cruz (R-TX) and Maria Cantwell (D-WA) sent the chairman a joint letter admonishing him for allowing his staff to waive the regulations to let the merger pass, instead of having the full commission of political appointees — one from the Biden administration — vote on it. “Under these circumstances,” they wrote, “any subsequent vote risks being largely procedural rather than a genuine exercise of commission responsibility.” They also pointed out that their hasty approval without the commission’s approval would now complicate the merger financially: “In a transaction of this scale, where integration proceeds quickly and unwinding becomes impractical, delay in judicial review can insulate the decision from meaningful challenge.” Notably, though they share similar ideological views on the media and deregulation, Cruz and Carr have frequently clashed over how to achieve their objectives. Cruz previously slammed Carr as a “mafioso,” for instance, for the way he’d used the FCC to silence Kimmel.

But even if it’s legally paused, the journalistic merger’s fallout has started to hit local news. NPR’s David Folkenfirk reported on Tuesday that Tegna journalists had already started receiving orders to stop broadcasting content from major broadcasters like ABC, CBS, and NBC — media outlets being targeted by Carr — and instead begin airing content from Nexstar’s NewsNation.

  • Brendan Carr’s views on using the FCC to punish major broadcasters was outlined pretty extensively in the chapter he authored in Project 2025, an initiative led by the conservative Heritage Foundation on how to reform the federal bureaucracy to be more favorable to the American right.
  • Exactly how much is local television losing to digital? According to industry publication NewscastStudio, in an investor call defending the purchase, Nexstar chairman Perry Sook cited a market research study from Borrell Associates, which found that “digital advertising in local markets exceeds $100 billion, compared to just $25 billion for local linear television advertising, with nearly two-thirds of digital ad dollars flowing to five major technology companies.”
  • If you want to see exactly how much Keep Local News was trying to suck up to Trump, the ads are archived here.
  • The Vergecast has a long-running segment called “Brendan Carr is a dummy.”
  • The LA Times reported on last week’s preliminary hearings in front of Nunley, and how lawyers for Nexstar, the states, and DirecTV plan to argue their case.
  • The Desk has insights from Kirk Varner, a former TV newsroom director, on how the case could go.
  • Andrew Liptak covered Nexstar’s previous acquisition sprees for The Verge in 2018.
  • Adi Robertson walks through exactly how the Kimmel suspension was an attack on free speech.
  • Brendan Carr keeps trying to convince people that he’s not threatening to suspend broadcast licenses for reporting on unfavorable things like the Iran war, reports Lauren Feiner.
  • The Vergecast has a long-running segment called “Brendan Carr is a dummy.”
Follow topics and authors from this story to see more like this in your personalized homepage feed and to receive email updates.

Continue Reading

Technology

Chinese robot breaks human world record in Beijing half-marathon

Published

on

Chinese robot breaks human world record in Beijing half-marathon

NEWYou can now listen to Fox News articles!

A Chinese-built humanoid robot beat the human half-marathon world record in Beijing on Sunday, marking a breakthrough moment in a high-stakes global race for technological dominance.

A robot developed by Chinese smartphone maker Honor completed the 21-kilometer (13-mile) race in 50 minutes and 26 seconds, beating the human record of about 57 minutes set by Uganda’s Jacob Kiplimo last month.

The performance marked a dramatic improvement from last year’s inaugural event, when the top robot finished in more than 2 hours and 40 minutes.

Dozens of humanoid robots competed alongside about 12,000 human runners, navigating a parallel course to avoid collisions.

Advertisement

CHINA’S COMPACT HUMANOID ROBOT SHOWS OFF BALANCE AND FLIPS

A robot crosses the finish line in the Beijing E-Town Half Marathon and Humanoid Robot Half-Marathon held in the outskirts of Beijing on April 19, 2026. (Andy Wong/AP)

Nearly half of the robots ran using autonomous navigation, while others relied on remote control, organizers said.

Despite the breakthrough, the race still saw glitches, with some robots stumbling at the start or veering into barriers.

Engineers said the winning robot was designed to mimic elite athletes, featuring long legs of about 37 inches and advanced cooling systems to sustain performance.

Advertisement

US TARGETS CHINESE ROBOTS OVER SECURITY FEARS

“Looking ahead, some of these technologies might be transferred to other areas,” said Du Xiaodi, an engineer with the Honor team. “For example, structural reliability and liquid-cooling technology could be applied in future industrial scenarios.”

Team members celebrate next to the winning Honor Lightning humanoid robot during a medal ceremony after the second Beijing E-Town Half Marathon and Humanoid Robot Half Marathon in Beijing, China, on April 19, 2026. (Maxim Shemetov/Reuters)

Spectators reacted with a mix of amazement and unease at the machines’ rapid progress.

“It’s the first time robots have surpassed humans, and that’s something I never imagined,” Sun Zhigang, who attended the event with his son, told The Associated Press.

Advertisement

HUMANOID ROBOTS HIT MASS PRODUCTION IN CHINA

“The robots’ speed far exceeds that of humans,” spectator Wang Wen told the outlet. “This may signal the arrival of sort of a new era.”

A robot starts alongside human runners at the Beijing E-Town Half Marathon and Humanoid Half Marathon on the outskirts of Beijing on April 19, 2026. (Ng Han Guan/AP)

Experts say the race highlights China’s accelerating push to dominate robotics and artificial intelligence, even as widespread commercial use of humanoid robots remains limited, according to Reuters. The experts said Chinese robotics firms are still working to develop the AI software needed for humanoids to match the efficiency of human factory workers.

Runners take pictures of a humanoid robot during the second Beijing E-Town Half Marathon and Humanoid Robot Half Marathon in Beijing on April 19, 2026. (Haruna Furuhashi/Pool Photo via AP)

Advertisement

“The future will definitely be an AI era,” engineering student Chu Tianqi told Reuters. “If people don’t know how to use AI now … they will definitely become obsolete.”

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

The competition underscores a broader technological race between China and the United States, as Beijing invests heavily in advanced robotics as part of its long-term economic strategy.

The Associated Press and Reuters contributed to this report.

Advertisement
Continue Reading

Technology

The RAM shortage could last years

Published

on

The RAM shortage could last years

According to Nikkei Asia, even as suppliers ramp up DRAM production, manufacturers are only expected to meet 60 percent of demand by the end of 2027. SK Group chairman has even said that shortages could last until 2030.

The world’s largest memory makers — Samsung, SK Hynix, and Micron — are all working to add new fabrication capacity, but almost none of it will be online until at least 2027, if not 2028. SK opened a fab in Cheongju in February, but that is the only increase in production among the three for 2026.

Nikkei says that production would need to increase by 12 percent a year in 2026 and 2027 to meet demand. But according to Counterpoint Research, an increase of only 7.5 percent is planned.

The new facilities will primarily focus on producing high-bandwidth memory (HBM), which is used in AI data centers. With the companies already prioritizing HBM over general-purpose DRAM used in computers and phones, it’s not clear how much these new fabs will help alleviate the price crunch facing consumer electronics. Everything from phones and laptops, to VR headsets and gaming handhelds have seen price increases due to the RAM shortage.

Continue Reading
Advertisement

Trending