SEVERAL SHOCKING FACTS WHICH HACKERS MAY KNOW ABOUT YOU

How to know for sure that you are the only owner of your router? If you are the only person who has an encryption key for the wireless access point, you will be shocked after reading this article. Keep calm and go on!

WEP ENCRYPTION IS POWERLESS AGAINST HACKERS

Wired Equivalent Privacy or WEP lulls users into the false sense of confidence about the state of their privacy. Several minutes are enough for not so experienced hackers to crack the password.

WEP passwords will not make your PC secured because it is powerless in most cases.

You should be alert about your security if your routers works for years without changing the encryption from WEP to the advanced and more powerful WPA2 (Wi-Fi Protected Access II is a security protocol and security certification program that secures wireless computer networks). It is a piece of pie to switch for WPA2, just look through router manufacturer’s website.

ROUTER’S MAC FILTER IS NOT EFFICIENT

The majority of IP-based routers allow to permit or deny network access as they have own hard-coded MAC addresses. So that, users are confident that nobody can get access to their wi-fi if they do not know the password. Hackers deceive your MAC, pretending to be accepting one. The router will verify the fake MAC request as allowable and permit the access.

REMOTE ADMINISTRATION FEATURE

Do you know about the option that can allow to control the wireless router? The main feature of this option is that the owner has remote access to the router, and he does need a computer and an Internet cable to administrate all the settings. Unfortunately, this option is comfortable not for the owners of the router only…

Hackers will have a brilliant opportunity to join the control over your router. We recommend you to switch off this function and change the settings using a ‘hard wired,’ connection.

PUBLIC HOTSPOTS

Cyber criminals successfully attack users when they connect to the free Wi-Fi with the help of Firesheep and AirJack programs. There is a wireless link between the sender and receiver, and hackers intrude into it. Being incorporated into this chat, third-party users can monitor such personal data as account passwords, e-mails, etc. It is a well-known fact that people are often hijacked due to the public hotspots, so think twice before using them.

HOW TO SECURE YOUR PRIVACY

  • Password has to be tough and temporary, change it from time to time. As a rule, it will need to be at least 12 characters with numbers, capital and low-case letters.
  • Try to hack your PC yourself to know whether other can do the same.
  • Keep your software updated. The more often you do it, the stronger your security is.
  • Use time-tested and reliable software to protect your privacy and stay away from computer threats and hazardous items that can appear in the system.
(Visited 753 times, 1 visits today)

Related Post