Connect with us

Technology

The temptations and risks of free Wi-Fi

Published

on

The temptations and risks of free Wi-Fi

Public Wi-Fi is everywhere and incredibly convenient, but is it safe to use? Keep reading to explore the risks of using public Wi-Fi and how a VPN can help protect your privacy while browsing on the go.

Stay protected & informed! Get security alerts & expert tech tips. Sign up for Kurt’s The CyberGuy Report now.

Illustration of Wi-Fi icon (Kurt “CyberGuy” Knutsson)

Risks of using public Wi-Fi

Hackers sometimes try to trick you into connecting to a network labeled “FREE Wi-Fi.” Here’s what you need to know about the potential dangers of public Wi-Fi.

Unencrypted networks

Many public Wi-Fi networks are unencrypted, meaning the data transmitted over them is not secured. This makes it easy for cybercriminals with the right tools to intercept your online activities, including sensitive information like login details, banking data and personal messages.

Advertisement

Malware threats 

Connecting to public Wi-Fi can expose you to malware attacks. Malicious actors on the same network can take advantage of security flaws on your device to install harmful software. Some examples are spyware that steals your personal information or ransomware that locks your system or turns your device into a bot for a distributed denial-of-service attack.

Man-in-the-middle attacks

A man-in-the-middle attack occurs when an attacker secretly intercepts communication between two parties, like a user and an app. This allows them to listen in on or alter conversations. On unsecured public Wi-Fi networks, attackers can more easily capture data packets. This potentially gives them access to sensitive information like login credentials, credit card details or private messages. In some cases, they may even modify the data, leading to fraud or data breaches.

JUICE JACKING: FBI ISSUES ALERT ABOUT HIDDEN DANGERS AT PHONE CHARGING STATIONS 

Signs of an unsafe network

Hackers often take advantage of public Wi-Fi, but some may go a step further and create fake hot spots under their control. To help you steer clear of these traps, here are some common signs of a rogue Wi-Fi network.

  • The network name resembles a trusted one: Hackers sometimes set up fraudulent networks that mimic legitimate ones. For example, you might see duplicate network names or be connected to a “home network” when you’re far from home.
  • “HTTPS” sites appear as “HTTP”: If you’re trying to access a secure website and notice it’s loading as an “HTTP” site instead of “HTTPS,” you may be connected to a fake Wi-Fi hot spot.
  • The name is generic: Rogue networks often appear in busy areas with vague names like “Free Wi-Fi” to attract unsuspecting users. Legitimate public networks, like those in cafés, usually have more specific names tied to the business.
  • Unusual behavior: If you experience strange pop-ups, ads, frequent Wi-Fi disconnections or slow speeds, the network you’re connected to could be compromised. To minimize the risk, disconnect immediately and run a malware scan.

Now that you’re aware of the risks and how to recognize an unsafe Wi-Fi network, you can browse more securely.

Illustration of a hacker (Kurt “CyberGuy” Knutsson)

Advertisement

MISTAKES TO AVOID IF YOU JUST HAVE TO USE PUBLIC WI-FI

Where to find legitimate free Wi-Fi

If you’re looking for reliable spots to access free Wi-Fi, these are some great options.

WiFi Map

WiFi Map has pinpointed millions of free Wi-Fi locations across more than 200 countries. Their website displays nearby free Wi-Fi locations by city on an interactive map. Clicking on a spot will reveal the address, the Wi-Fi hot spot name and any required passwords. There’s also a mobile app available, which is especially handy for accessing passwords. Plus, the app offers an offline map feature, so you can search for hot spots without needing a connection.

Your local library 

Many libraries offer free Wi-Fi in addition to computer access. Bring your own device to enjoy internet access at no cost. Check your local library’s website or give them a call to confirm if they provide free Wi-Fi and learn about any connection requirements. While some libraries offer open access, others may ask for a password or require a library card number.

Wi-Fi-FreeSpot Directory 

The Wi-Fi-FreeSpot Directory helps you locate free Wi-Fi hot spots in the U.S., Canada, Asia, the Middle East and more. You can search by region, state or country and even narrow your search to specific types of locations, such as hotels, airports, coffee shops or vacation rentals that provide free Wi-Fi.

Advertisement

6 ways to protect your devices for secure public Wi-Fi use

Public Wi-Fi is everywhere, from your favorite coffee shop to the airport. But while it’s convenient, it also comes with some risks, as we mentioned above. Here are six essential tips to help keep your devices and data safe when you’re browsing on public networks.

1) Use a VPN: Accessing the internet in public places, like coffee shops, can put your personal data at risk. A VPN (virtual private network) ensures that your connection is secure and that your information is encrypted. Using a VPN is one of the most effective ways to safeguard your privacy when browsing on public Wi-Fi. It creates a private, encrypted tunnel for your data, protecting you from potential cyber threats. For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices.

VPN on an iPhone (Kurt “CyberGuy” Knutsson)

2) Have strong antivirus software: Cybercriminals often exploit the vulnerabilities of public Wi-Fi to distribute malware or intercept sensitive data, making it crucial to protect your devices against such threats. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

3) Use two-factor authentication (2FA): Enable 2FA on your accounts to add an extra layer of security, even if someone manages to intercept your password.

Advertisement

4) Set strong passwords: Use complex, unique passwords for each of your online accounts. Get more details about my best expert-reviewed password managers of 2025 here.

5) Keep software updated: Ensure your operating system, applications and security software are up to date to patch known vulnerabilities.

6) Avoid sensitive transactions: Refrain from accessing sensitive information or making financial transactions while on public Wi-Fi.

AVOID PUBLIC WI-FI BY USING YOUR IPHONE AS A HOT SPOT

Kurt’s key takeaways

Finding free Wi-Fi is easy, but it’s important to watch out for security risks. Services like WiFi Map, local libraries and Wi-Fi-FreeSpot can help you find safe hot spots. To protect your data, always use a VPN on public networks and be careful of suspicious networks or activity.

Advertisement

Have you ever fallen victim to a public Wi-Fi scam? What happened? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Alert: Malware steals bank cards and passwords from millions of devices.

Ask Kurt a question or let us know what stories you’d like us to cover.

Follow Kurt on his social channels:

Advertisement

Answers to the most-asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

Technology

Blue Origin scrubs second New Glenn launch

Published

on

Blue Origin scrubs second New Glenn launch

The second launch of Blue Origin’s partially reusable New Glenn rocket was scrubbed on Sunday due to adverse weather conditions, delaying NASA’s latest Mars mission. The Jeff Bezos-owned commercial space company announced that its next launch window from Cape Canaveral Space Force Station in Florida will be attempted “no earlier” than Wednesday, November 12th, between 2:50PM and 4:17PM ET.

This is a significant launch for the 320-foot-tall megarocket, which is tasked with sending NASA’s twin ESCAPADE (Escape and Plasma Acceleration and Dynamics Explorers) probes into space — the first Mars-bound mission since NASA launched its Perseverance and Ingenuity vehicles in 2020 to explore the red planet’s surface. The ESCAPADE satellites are projected to reach Mars orbit in 2027, where they will measure the planet’s magnetic field and atmosphere.

This will also be Blue Origin’s latest attempt to land New Glenn’s reusable first-stage booster, which, much like SpaceX’s Falcon rocket boosters, is designed to vertically touch down on a sea-based platform following launch. While Blue Origin successfully launched New Glenn for the first time in January after several delays, the booster was lost during its landing descent. A successful launch and landing would help Blue Origin to prove itself as a deep-space launch provider that’s capable of competing with established rivals like SpaceX and United Launch Alliance.

Blue Origin says it worked with the Federal Aviation Administration to select its latest launch window, having seemingly been given an exemption to new FAA rules that prohibit commercial rockets from being launched between 6AM and 10PM. This emergency order came into effect on November 10th to alleviate air traffic congestion during the ongoing government shutdown. If all goes to plan, the live webcast for New Glenn’s second flight will start 20 minutes prior to launch on Wednesday.

Continue Reading

Technology

Thieves steal $100M in jewels from Louvre after museum used own name as surveillance password

Published

on

Thieves steal 0M in jewels from Louvre after museum used own name as surveillance password

NEWYou can now listen to Fox News articles!

When thieves stole $100 million in jewels from the world-famous Louvre Museum in Paris, France, they shocked the art world and revealed a serious digital weakness. French media reports say the museum once used its own name, Louvre, as a password for its surveillance system.

That detail may sound unbelievable, yet it highlights how often people still rely on weak passwords even in high-security places that should know better.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter

Thieves reportedly stole more than $100 million in jewels from the world-famous Louvre Museum in Paris, exposing surprising gaps in security. (AP Photo/Thibault Camus)

Advertisement

Louvre password security flaws revealed in investigator’s audit

A decade-old French cybersecurity audit reportedly showed troubling gaps in the museum’s defenses. The Louvre is said to have once run outdated Windows Server 2003 software and had unguarded rooftop access, something eerily similar to how the recent thieves used an electric ladder to reach a balcony.

The biggest mistake? Using “Louvre” and “Thales” as passwords. One of them was even said to be visible on the login screen. That was like leaving the keys under the doormat of the world’s most famous museum.

CyberGuy reached out to the Louvre for comment, but did not receive a response before our deadline.

LOUVRE DIRECTOR GRILLED ON SPECTACULAR SECURITY FAILURES, INCLUDING CAMERA POINTING AWAY FROM KEY BALCONY

And while the Louvre may have tightened security since then, experts warn that password habits like these are still widespread among businesses and individuals.

Advertisement

Why Louvre’s weak passwords matter for your online security

You might not have priceless jewels to protect, but your personal data, financial info and digital identity are just as valuable to hackers. With the holiday shopping season here, cybercriminals ramp up their attacks, knowing millions of you are logging in, buying online and often reusing old passwords.

How to create stronger passwords

Reports revealed the museum once used simple passwords like “Louvre” and “Thales,” raising serious cybersecurity concerns. (AP Photo/Thomas Padilla)

REPORTER’S NOTEBOOK: A PARIS JEWEL HEIST STRAIGHT OUT OF THE MOVIES

Protecting yourself online doesn’t have to be complicated. Follow these tips to boost your defenses:

  • Avoid using your name or anything easily guessed.
  • Mix uppercase and lowercase letters, numbers and symbols.
  • Change passwords if a company you use reports a data breach.
  • Skip sticky notes or digital files with unencrypted passwords.

LOUVRE HEIST IN BROAD DAYLIGHT AMID APPARENT SECURITY LAPSES PUTS GLOBAL MUSEUMS ON ALERT

Think beyond your phone or laptop. Your Wi-Fi router, smart home devices and even security cameras all have passwords that need attention.

Advertisement

Stay safe with a password manager

If keeping up with dozens of unique passwords sounds overwhelming, a password manager can help. These tools generate strong, unique, complex passwords for every account and store them securely in one encrypted vault. This reduces the risk of password reuse. Many password managers also alert you to compromised passwords or sites hit by data leaks.

LOUVRE HEIST ADDS TO HISTORY OF HIGH-PROFILE MUSEUM BREACHES, LEAVES OTHER GALLERIES ON EDGE

Next, see if your email has been exposed in past breaches. Our No. 1 password manager (see Cyberguy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

Check out the best expert-reviewed password managers of 2025 at Cyberguy.com

Cybersecurity experts say everyone should strengthen passwords and consider using a password manager to stay protected online. (Neil Godwin/Future via Getty Images)

Advertisement

Kurt’s key takeaways

The Louvre’s massive heist shows that even the most respected institutions can make simple cybersecurity mistakes. You can learn from their example by strengthening your own passwords and taking digital safety seriously. Start by creating unique, complex passwords for every account and consider using a password manager to keep them secure and organized. A few minutes of effort today can protect you from financial loss, identity theft or worse.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Have you ever spotted a weak password or security risk that made you shake your head? Let us know by writing to us at Cyberguy.com

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter

Copyright 2025 CyberGuy.com. All rights reserved.  

Advertisement

Continue Reading

Technology

The tale of the Fire Phone, Amazon’s very strange smartphone

Published

on

The tale of the Fire Phone, Amazon’s very strange smartphone

When Jeff Bezos decided Amazon needed to get in the smartphone game, he went all in. And the resulting device, the Fire Phone, wound up more densely packed with big ideas than just about any gadget you’ll find anywhere. There was just one tiny problem: they were mostly bad ideas.

The Fire Phone shipped in 2014 with a feature list a mile long. The screen had a 3D effect! There were, like, 400 cameras! There was a whole home screen filled with something called “delighters!” But the Fire Phone was, above all, a way to buy things on Amazon. That was what Bezos wanted, after all. It’s just not what users wanted.

For this episode of Version History, we tell the story of the Fire Phone from beginning to end. (It doesn’t take that long.) David Pierce, Allison Johnson, and Sean O’Kane discuss how the success of the Kindle led to Amazon’s expanded hardware plans, the brewing fight with Apple over app store policies, the ways in which Bezos himself directed the product, and the astonishing speed with which the thing flopped. Only a few months after it launched, the Fire Phone could be had for less than a buck. People still didn’t want it.

Utlimately, the device that was supposed to be the beginning of something big for Amazon turned out to be very small indeed. But that doesn’t make its story any less interesting.

This is the fifth episode of Version History. (We’re more than halfway through season one!) If you want to find the show, there are three good places to go:

Advertisement

Thanks to everyone who has already watched or listened to the show, and has sent feedback! We’re already putting on the next bunch of episodes, and want to hear everything you think we should be doing or not doing or doing differently. What other huge product failures deserve their own episode? You tell us. In the meantime, if you want to know more about the Fire Phone story, here are some links to get you started:

Continue Reading

Trending