Connect with us

Technology

The temptations and risks of free Wi-Fi

Published

on

The temptations and risks of free Wi-Fi

Public Wi-Fi is everywhere and incredibly convenient, but is it safe to use? Keep reading to explore the risks of using public Wi-Fi and how a VPN can help protect your privacy while browsing on the go.

Stay protected & informed! Get security alerts & expert tech tips. Sign up for Kurt’s The CyberGuy Report now.

Illustration of Wi-Fi icon (Kurt “CyberGuy” Knutsson)

Risks of using public Wi-Fi

Hackers sometimes try to trick you into connecting to a network labeled “FREE Wi-Fi.” Here’s what you need to know about the potential dangers of public Wi-Fi.

Unencrypted networks

Many public Wi-Fi networks are unencrypted, meaning the data transmitted over them is not secured. This makes it easy for cybercriminals with the right tools to intercept your online activities, including sensitive information like login details, banking data and personal messages.

Advertisement

Malware threats 

Connecting to public Wi-Fi can expose you to malware attacks. Malicious actors on the same network can take advantage of security flaws on your device to install harmful software. Some examples are spyware that steals your personal information or ransomware that locks your system or turns your device into a bot for a distributed denial-of-service attack.

Man-in-the-middle attacks

A man-in-the-middle attack occurs when an attacker secretly intercepts communication between two parties, like a user and an app. This allows them to listen in on or alter conversations. On unsecured public Wi-Fi networks, attackers can more easily capture data packets. This potentially gives them access to sensitive information like login credentials, credit card details or private messages. In some cases, they may even modify the data, leading to fraud or data breaches.

JUICE JACKING: FBI ISSUES ALERT ABOUT HIDDEN DANGERS AT PHONE CHARGING STATIONS 

Signs of an unsafe network

Hackers often take advantage of public Wi-Fi, but some may go a step further and create fake hot spots under their control. To help you steer clear of these traps, here are some common signs of a rogue Wi-Fi network.

  • The network name resembles a trusted one: Hackers sometimes set up fraudulent networks that mimic legitimate ones. For example, you might see duplicate network names or be connected to a “home network” when you’re far from home.
  • “HTTPS” sites appear as “HTTP”: If you’re trying to access a secure website and notice it’s loading as an “HTTP” site instead of “HTTPS,” you may be connected to a fake Wi-Fi hot spot.
  • The name is generic: Rogue networks often appear in busy areas with vague names like “Free Wi-Fi” to attract unsuspecting users. Legitimate public networks, like those in cafés, usually have more specific names tied to the business.
  • Unusual behavior: If you experience strange pop-ups, ads, frequent Wi-Fi disconnections or slow speeds, the network you’re connected to could be compromised. To minimize the risk, disconnect immediately and run a malware scan.

Now that you’re aware of the risks and how to recognize an unsafe Wi-Fi network, you can browse more securely.

Illustration of a hacker (Kurt “CyberGuy” Knutsson)

Advertisement

MISTAKES TO AVOID IF YOU JUST HAVE TO USE PUBLIC WI-FI

Where to find legitimate free Wi-Fi

If you’re looking for reliable spots to access free Wi-Fi, these are some great options.

WiFi Map

WiFi Map has pinpointed millions of free Wi-Fi locations across more than 200 countries. Their website displays nearby free Wi-Fi locations by city on an interactive map. Clicking on a spot will reveal the address, the Wi-Fi hot spot name and any required passwords. There’s also a mobile app available, which is especially handy for accessing passwords. Plus, the app offers an offline map feature, so you can search for hot spots without needing a connection.

Your local library 

Many libraries offer free Wi-Fi in addition to computer access. Bring your own device to enjoy internet access at no cost. Check your local library’s website or give them a call to confirm if they provide free Wi-Fi and learn about any connection requirements. While some libraries offer open access, others may ask for a password or require a library card number.

Wi-Fi-FreeSpot Directory 

The Wi-Fi-FreeSpot Directory helps you locate free Wi-Fi hot spots in the U.S., Canada, Asia, the Middle East and more. You can search by region, state or country and even narrow your search to specific types of locations, such as hotels, airports, coffee shops or vacation rentals that provide free Wi-Fi.

Advertisement

6 ways to protect your devices for secure public Wi-Fi use

Public Wi-Fi is everywhere, from your favorite coffee shop to the airport. But while it’s convenient, it also comes with some risks, as we mentioned above. Here are six essential tips to help keep your devices and data safe when you’re browsing on public networks.

1) Use a VPN: Accessing the internet in public places, like coffee shops, can put your personal data at risk. A VPN (virtual private network) ensures that your connection is secure and that your information is encrypted. Using a VPN is one of the most effective ways to safeguard your privacy when browsing on public Wi-Fi. It creates a private, encrypted tunnel for your data, protecting you from potential cyber threats. For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices.

VPN on an iPhone (Kurt “CyberGuy” Knutsson)

2) Have strong antivirus software: Cybercriminals often exploit the vulnerabilities of public Wi-Fi to distribute malware or intercept sensitive data, making it crucial to protect your devices against such threats. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

3) Use two-factor authentication (2FA): Enable 2FA on your accounts to add an extra layer of security, even if someone manages to intercept your password.

Advertisement

4) Set strong passwords: Use complex, unique passwords for each of your online accounts. Get more details about my best expert-reviewed password managers of 2025 here.

5) Keep software updated: Ensure your operating system, applications and security software are up to date to patch known vulnerabilities.

6) Avoid sensitive transactions: Refrain from accessing sensitive information or making financial transactions while on public Wi-Fi.

AVOID PUBLIC WI-FI BY USING YOUR IPHONE AS A HOT SPOT

Kurt’s key takeaways

Finding free Wi-Fi is easy, but it’s important to watch out for security risks. Services like WiFi Map, local libraries and Wi-Fi-FreeSpot can help you find safe hot spots. To protect your data, always use a VPN on public networks and be careful of suspicious networks or activity.

Advertisement

Have you ever fallen victim to a public Wi-Fi scam? What happened? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Alert: Malware steals bank cards and passwords from millions of devices.

Ask Kurt a question or let us know what stories you’d like us to cover.

Follow Kurt on his social channels:

Advertisement

Answers to the most-asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

Technology

Spotify’s new audiobook recap feature uses AI to remind you of the story so far

Published

on

Spotify’s new audiobook recap feature uses AI to remind you of the story so far

Spotify is launching a new AI feature for audiobooks that summarizes what you’ve already heard without needing to rewind. The company likens the feature, called Recaps, to a “previously on” segment at the start of episodes in a TV series.

Recaps will be available automatically in the iOS app for a limited number of English-language audiobooks, with plans to expand to more audiobooks in an unspecified time frame. While the Recap button is always present on supported titles, you will have to listen to more than 15–20 minutes of the audiobook to get a summary, according to the Spotify blog post on the feature. After that, Recaps will be “regularly updated” as you progress through the audiobook. It’s “designed to help people finish the books they start,” the company says in the blog.

True-crime author J.H. Markert called the feature “an audio bookmark that speaks” in the company blog. “Using it once blew my mind. As sophisticated as it is smart, this feature is a must for any audiobook lovers out there.”

Spotify made clear that Recaps uses AI, but maintains that the original works — including the book content and voice narration — remain protected. “We are not using audiobook content for LLM training purposes or voice generation, and Recaps do not replicate narration or replace the original audiobook in any way,” Spotify’s research director of LLMs, Paul Bennett, wrote in the blog post.

Continue Reading

Technology

Apple passkey technology transforms Mac security with biometric authentication, encrypted storage

Published

on

Apple passkey technology transforms Mac security with biometric authentication, encrypted storage

NEWYou can now listen to Fox News articles!

Your Mac holds a lot more than just files. It carries your personal information, payment data, messages and every online account you access. Keeping that information safe starts with how you sign in. For years, passwords have been the standard way to protect accounts, but they are also one of the weakest links in digital security. They can be guessed, stolen or reused across multiple sites.

Apple’s introduction of passkeys marks a major step forward. Instead of relying on something you need to remember, passkeys rely on something you have (your trusted Apple device) and something you are, like your fingerprint or face. Together with iCloud Keychain and two-factor authentication, passkeys create a seamless and much safer way to secure your Mac and your digital life.

What are passkeys?

Passkeys are a modern alternative to passwords. They use public key cryptography to let you sign in without ever creating or typing a password. When you register for an account using a passkey, your Mac creates two unique keys. One is public and stored by the website or app, and the other is private and stays securely on your device.

The public key is not sensitive information. The private key, on the other hand, never leaves your Mac and is protected behind your device’s security features. When you sign in, Touch ID or Face ID confirms your identity before your Mac uses the private key to authenticate you. This process prevents phishing and password leaks because no shared secret is ever transmitted to the website.

Advertisement

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

HOW TO USE PASSKEYS TO KEEP YOUR COMPUTER SAFE

A passkey on your Mac replaces passwords with a faster, more secure way to sign in. (Kurt “CyberGuy” Knutsson)

How Apple keeps passkeys secure

Passkeys are stored and synced across your devices through iCloud Keychain, which is protected by end-to-end encryption. This means that not even Apple can access your passkeys or passwords. iCloud Keychain also has built-in protection against brute force attacks, even if someone were to gain unauthorized access to Apple’s servers.

If you lose your devices, you can still recover your passkeys through iCloud Keychain recovery. To do this, you must sign in with your Apple ID and password, verify your identity with a code sent to your trusted number and confirm using your device passcode. The system limits the number of attempts, and if too many failed attempts occur, the recovery record is locked or destroyed to prevent misuse.

Advertisement

You can also set an account recovery contact to make sure you never lose access, even if you forget your Apple ID password or device passcode. This multi-layered design ensures that your data remains secure even in extreme scenarios, such as a compromised Apple account or cloud breach.

How to set up passkeys on your Mac

Setting up passkeys is simple and requires iCloud Keychain to be enabled.

  • Choose the Apple menu, then select System Settings.
  • Click your name, then click iCloud.
  • Click Passwords. In macOS Sonoma or earlier, click Passwords & Keychain.
  • Click Sync this Mac, then click Done.
  • When you sign up for a website or app that supports passkeys, you’ll now see the option to create a passkey.
  • If your Mac has Touch ID, place your finger on the sensor to confirm.
  • If you are using an iPhone or iPad nearby, select Other Options and scan the QR code shown on your Mac to confirm with Face ID.
  • You can also replace an existing password by visiting the account settings of a supported website or app and selecting the option to switch to a passkey.

Once created, your passkeys are automatically stored in iCloud Keychain and available on all devices signed in with the same Apple ID.

Major services that support passkeys

Passkey adoption is growing quickly across major tech platforms. As of now, many of the biggest online services already let you sign in without a password.

Some of the key ones include:

  • Google
  • Microsoft
  • Apple
  • Amazon
  • PayPal
  • GitHub
  • Uber
  • eBay
  • WhatsApp
  • Facebook

Support for passkeys continues to expand every month as more companies integrate the technology into their login systems. On most of these platforms, you can now create new accounts or switch your existing ones to passkeys for faster, more secure sign-ins.

Each passkey is unique to your account and safely stored in your device’s iCloud Keychain. (iStock)

Advertisement

6 additional steps to keep your Mac safe

Passkeys add a strong layer of protection, but good security habits still matter. Here are more steps to strengthen your Mac’s defenses. 

1) Enable two-factor authentication

Two-factor authentication (2FA) adds another layer of protection to your Apple ID. It works by requiring two forms of verification: your password and a one-time code sent to a trusted device or phone number. This means that even if someone somehow gets your password, they still cannot access your account without also having your device.

10 WAYS TO SECURE YOUR OLDER MAC FROM THREATS AND MALWARE

2) Review your trusted devices and numbers

Regularly check which devices and phone numbers are linked to your Apple ID. On your Mac, click the Apple icon in the upper left of the screen. Then go to System Settings → Apple ID → Devices and remove anything you don’t recognize. Make sure your trusted phone number is still current, since it’s critical for account recovery.

3) Use a password manager

Even though passkeys are replacing passwords, many sites still rely on traditional logins. A password manager helps you create, store and fill in unique passwords for every account. iCloud Keychain can do this automatically across all your Apple devices, but if you want more flexibility, you might want to consider a third-party password manager.

Advertisement

Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. 

Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.

4) Be wary of phishing attempts and install strong antivirus software

Phishing remains one of the most common ways attackers try to steal personal information. They may send fake emails or messages pretending to be from Apple or other trusted companies, urging you to click links or provide login details. Always double-check the sender’s address and avoid clicking on links that seem suspicious. Instead, visit the website directly by typing the address into your browser.

While macOS has strong built-in defenses such as Gatekeeper and XProtect, installing strong antivirus software adds another layer of protection against malware, adware and potentially unwanted programs. Strong antivirus software continuously monitors your system for suspicious behavior and can alert you to threats before they cause damage. It is especially useful if you download files from outside the App Store or connect external drives frequently.

The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

Advertisement

Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

Using a passkey with Touch ID or Face ID keeps your information protected from phishing and leaks. (Kurt “CyberGuy” Knutsson)

5) Turn On FileVault disk encryption

FileVault protects everything stored on your Mac by encrypting the entire hard drive. That means if your computer is ever lost or stolen, your data stays locked away from prying eyes. Go to System Settings → Privacy & Security → FileVault to enable it.

6) Keep macOS updated automatically

Apple regularly releases software updates that include important security patches. Cybercriminals often target outdated systems because they contain known vulnerabilities. By keeping macOS and your apps up to date, you make it harder for attackers to exploit weaknesses. To make this effortless, turn on Automatic Updates under System Settings → General → Software Update → Automatic Updates.

7) Back up with time machine

Backing up your Mac is just as important as protecting it. Time Machine automatically backs up your files to an external drive or network disk, keeping your data safe from ransomware, hardware failure or accidental deletion. Make sure your backup drive is encrypted for extra protection.

Advertisement

HOW A SINGLE MACBOOK COMPROMISE SPREAD ACROSS A USER’S APPLE DEVICES

8) Use a data removal service

Even with passkeys, your personal information can still be exposed through data broker sites that collect and sell your details. Using a data removal service can help remove your private data from hundreds of these sites automatically. It’s an effective way to reduce your online footprint and protect your identity, especially when combined with Apple’s built-in security tools.

While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

Advertisement

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Kurt’s key takeaway

Passwords have served us for decades, but they are no longer enough to protect our digital identities. Passkeys make signing in faster, easier and significantly more secure by removing the weaknesses of traditional passwords. Combined with Apple’s encryption, iCloud Keychain and two-factor authentication, they represent one of the safest ways to protect your Mac and everything on it.

Have you tried using passkeys yet on your Mac, and what was your experience like? Let us know by writing to us at Cyberguy.com.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.

Copyright 2025 CyberGuy.com.  All rights reserved.  

Advertisement

Continue Reading

Technology

We tried Valve’s new VR headset, PC, and controller — ask us anything!

Published

on

We tried Valve’s new VR headset, PC, and controller — ask us anything!

Hi! I’m Jay Peters, a senior reporter here at The Verge. I’m perhaps the site’s second-biggest Steam Deck fan, surpassed only by Sean Hollister, our unofficial handheld gaming PC reviewer. So you can imagine how excited we were to visit Valve’s headquarters to try the company’s three new hardware products: the Steam Frame, a streaming-focused VR headset; the Steam Machine, a Valve-designed gaming PC for the living room; and the Steam Controller.

Those links take you to our big stories about all three pieces of gear, and I encourage you to read the articles and bask in our photos from Ripple at Everything Time Studio. But if you’re a Verge subscriber and have any burning questions we didn’t answer about the hardware or Valve’s strategy in our stories, we’re hosting a subscriber-only Ask Me Anything session today in the comments of this post.

Feel free to start dropping in your comments and questions right now, no need to wait. Sean and I will both start replying at about 3PM ET. We’re looking forward to it!

Continue Reading

Trending