{"id":6723,"date":"2024-10-12T15:34:25","date_gmt":"2024-10-12T15:34:25","guid":{"rendered":"https:\/\/mpelembe.net\/?p=6723"},"modified":"2024-10-12T15:34:25","modified_gmt":"2024-10-12T15:34:25","slug":"as-an-ethical-hacker-i-cant-believe-the-risks-people-routinely-take-when-they-access-the-internet-in-public","status":"publish","type":"post","link":"https:\/\/mpelembe.net\/index.php\/as-an-ethical-hacker-i-cant-believe-the-risks-people-routinely-take-when-they-access-the-internet-in-public\/","title":{"rendered":"As an ethical hacker, I can\u2019t believe the risks people routinely take when they access the internet in\u00a0public"},"content":{"rendered":"<div class=\"theconversation-article-body\">\n<p>  <span><a href=\"https:\/\/theconversation.com\/profiles\/christopher-patrick-hawkins-2204544\">Christopher Patrick Hawkins<\/a>, <em><a href=\"https:\/\/theconversation.com\/institutions\/university-of-staffordshire-1381\">University of Staffordshire<\/a><\/em><\/span><\/p>\n<p>In the modern world we are all constantly connected, but this comes with risks. As most <a href=\"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/08874417.2023.2221200\">cybersecurity specialists<\/a> will tell you, the biggest vulnerability in any system is the user \u2013 whether at home or work. <\/p>\n<p><!--more--><\/p>\n<p>The <a href=\"https:\/\/www.cobalt.io\/blog\/cybersecurity-statistics-2024\">most common ways<\/a> in which hackers break into systems are via attacks on users such as phishing, rather than by breaching technical infrastructure. As <a href=\"https:\/\/www.cobalt.io\/blog\/cybersecurity-statistics-2024\">much as 94%<\/a> of all malware is delivered via email, while phishing is the primary means of attack <a href=\"https:\/\/www.cobalt.io\/blog\/cybersecurity-statistics-2024\">in 41%<\/a> of all incidents. This risk is also increasing, with <a href=\"https:\/\/www.cobalt.io\/blog\/cybersecurity-statistics-2024\">75% of<\/a> security experts reporting an overall rise in cyberattacks year on year in 2023.<\/p>\n<p>Many corporate IT teams have been <a href=\"https:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/08874417.2020.1712269\">spending heavily<\/a> on training users to be more wary of such attacks. However, this has tended to focus on best practice in the workplace. In public areas, where people\u2019s guards might be lowered, it\u2019s quite a different story.  <\/p>\n<p>I\u2019ve recently seen several examples of this for myself. As a certified <a href=\"https:\/\/www.linkedin.com\/posts\/chris-hawkins-mbcs-bsc-hons-msc-pip2-ceh-m-cei-ecm-76082a19b_hacking-ethicalhacking-ethicalhackingtraining-activity-7098398977317842944-gS96\">ethical hacker<\/a> with years of experience in cybersecurity and contributing to cybercriminal investigations, I can\u2019t tell you how easy it is for these kinds of situations to be exploited by bad actors. <\/p>\n<p>In the first incident, I was in a shop buying some household items. While I queued, staff were asking customers for email addresses to send them e-receipts for their items. <\/p>\n<p>This might sound innocent, and it\u2019s surely better for the environment than paper receipts, but it could easily be exploited by a savvy hacker who might be listening. Combined with contextual information such as location, item and cost, they could craft a phishing email that would probably fool most people. It could be an invite to complete a feedback survey, for instance, or a discount code for their next visit to the same store. <\/p>\n<p>On another occasion I was at a live concert. While we waited for the show to begin, an individual in front of me was browsing his phone. From observing for just a short time, I ascertained his name, job, address, vehicle, phone number and even bank balance. Again, this could have been used by a hacker in a number of malicious ways, including posing as the individual to steal their identity or even coercing them to act against their employer, say <a href=\"https:\/\/www.digitalforensics.com\/blog\/blackmail\/the-ultimate-guide-to-handling-hackers-blackmail-threats\/#:%7E:text=Hackers%20can%20blackmail%20individuals%20by%20gaining%20unauthorized%20access,to%20even%20simpler%20tactics%20like%20guessing%20weak%20passwords.\">by threatening<\/a> to reveal sensitive information. <\/p>\n<p>We therefore all need to be mindful of the information that we are exposing to strangers when we are in public. Equally, we need to think about what devices we are using, and what we are connecting them to. <\/p>\n<h2>Unsecured network risks<\/h2>\n<p>While at the same concert, I saw numerous people connecting to the stadium wifi, which was totally unprotected and required no authentication. When you log in to an unsecured network, it <a href=\"https:\/\/www.tomshardware.com\/networking\/australian-police-arrest-hacker-who-created-evil-twin-wireless-network-to-steal-data-during-flights\">exposes your device<\/a> to risks such as <a href=\"https:\/\/www.kaspersky.com\/resource-center\/preemptive-safety\/evil-twin-attacks\">evil twin attacks<\/a>. <\/p>\n<p>Evil twin attacks involve the attacker creating a wifi hotspot, which can be set to any name they choose, such as \u201cstadium wifi 2\u201d or whatever. When an unprotected device connects to this network, the attacker can potentially steal the data they are transmitting. <\/p>\n<p>It can also be used for other nefarious purposes such as snooping on confidential networks, injecting malware into downloads or \u201cman-in-the-middle\u201d attacks in which the hacker poses as the other person in a communication, again usually to steal information. <\/p>\n<p>People can be exposed to similar threats on unsecured networks through another hacking ruse known as <a href=\"https:\/\/www.avast.com\/c-packet-sniffing\">packet sniffing<\/a>. This is where a hacker uses a program to monitor the data moving over the network and steal information. <\/p>\n<figure class=\"align-center zoomable\">\n            <a href=\"https:\/\/images.theconversation.com\/files\/623852\/original\/file-20241007-19-zqydz6.jpg?ixlib=rb-4.1.0&amp;q=45&amp;auto=format&amp;w=1000&amp;fit=clip\"><img decoding=\"async\" alt=\"Wifi logo in digital illustration\" data-src=\"https:\/\/images.theconversation.com\/files\/623852\/original\/file-20241007-19-zqydz6.jpg?ixlib=rb-4.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;fit=clip\" data-srcset=\"https:\/\/images.theconversation.com\/files\/623852\/original\/file-20241007-19-zqydz6.jpg?ixlib=rb-4.1.0&amp;q=45&amp;auto=format&amp;w=600&amp;h=486&amp;fit=crop&amp;dpr=1 600w, https:\/\/images.theconversation.com\/files\/623852\/original\/file-20241007-19-zqydz6.jpg?ixlib=rb-4.1.0&amp;q=30&amp;auto=format&amp;w=600&amp;h=486&amp;fit=crop&amp;dpr=2 1200w, https:\/\/images.theconversation.com\/files\/623852\/original\/file-20241007-19-zqydz6.jpg?ixlib=rb-4.1.0&amp;q=15&amp;auto=format&amp;w=600&amp;h=486&amp;fit=crop&amp;dpr=3 1800w, https:\/\/images.theconversation.com\/files\/623852\/original\/file-20241007-19-zqydz6.jpg?ixlib=rb-4.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;h=611&amp;fit=crop&amp;dpr=1 754w, https:\/\/images.theconversation.com\/files\/623852\/original\/file-20241007-19-zqydz6.jpg?ixlib=rb-4.1.0&amp;q=30&amp;auto=format&amp;w=754&amp;h=611&amp;fit=crop&amp;dpr=2 1508w, https:\/\/images.theconversation.com\/files\/623852\/original\/file-20241007-19-zqydz6.jpg?ixlib=rb-4.1.0&amp;q=15&amp;auto=format&amp;w=754&amp;h=611&amp;fit=crop&amp;dpr=3 2262w\" data-sizes=\"(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" class=\"lazyload\"><\/a><figcaption>\n              <span class=\"caption\">Connecting now \u2026<\/span><br \/>\n              <span class=\"attribution\"><a class=\"source\" href=\"https:\/\/www.shutterstock.com\/image-photo\/young-pretty-woman-holding-smartphone-using-2249452169\">Alexander Supertramp<\/a><\/span><br \/>\n            <\/figcaption><\/figure>\n<p>You can avoid these risks by logging in from a <a href=\"https:\/\/en.wikipedia.org\/wiki\/Virtual_private_network\">virtual private network<\/a> (VPN), not that I saw anyone doing that at the concert. More generally, people can protect themselves from identity theft by, for instance, having <a href=\"https:\/\/www.csoonline.com\/article\/569867\/9-top-anti-phishing-tools-and-services.html\">anti-phishing systems<\/a> in their inboxes. <\/p>\n<p>However, the easiest defence of all is to be alert to the risks and take sensible precautions in public. By protecting your data and devices, no matter where you are, you can avoid becoming one of the victims.<!-- Below is The Conversation's page counter tag. Please DO NOT REMOVE. --><img decoding=\"async\" data-src=\"https:\/\/counter.theconversation.com\/content\/240599\/count.gif?distributor=republish-lightbox-basic\" alt=\"The Conversation\" width=\"1\" height=\"1\" style=\"--smush-placeholder-width: 1px; --smush-placeholder-aspect-ratio: 1\/1;border: none !important; box-shadow: none !important; margin: 0 !important; max-height: 1px !important; max-width: 1px !important; min-height: 1px !important; min-width: 1px !important; opacity: 0 !important; outline: none !important; padding: 0 !important\" referrerpolicy=\"no-referrer-when-downgrade\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" class=\"lazyload\" \/><!-- End of code. If you don't see any code above, please get new code from the Advanced tab after you click the republish button. The page counter does not collect any personal data. More info: https:\/\/theconversation.com\/republishing-guidelines --><\/p>\n<p><span><a href=\"https:\/\/theconversation.com\/profiles\/christopher-patrick-hawkins-2204544\">Christopher Patrick Hawkins<\/a>, Lecturer in Cyber Security and Computer Science, <em><a href=\"https:\/\/theconversation.com\/institutions\/university-of-staffordshire-1381\">University of Staffordshire<\/a><\/em><\/span><\/p>\n<p>This article is republished from <a href=\"https:\/\/theconversation.com\">The Conversation<\/a> under a Creative Commons license. Read the <a href=\"https:\/\/theconversation.com\/as-an-ethical-hacker-i-cant-believe-the-risks-people-routinely-take-when-they-access-the-internet-in-public-240599\">original article<\/a>.<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Christopher Patrick Hawkins, University of Staffordshire In the modern world we are all constantly connected, but this comes with risks. As most cybersecurity specialists<a class=\"moretag\" href=\"https:\/\/mpelembe.net\/index.php\/as-an-ethical-hacker-i-cant-believe-the-risks-people-routinely-take-when-they-access-the-internet-in-public\/\">Read More&#8230;<\/a><\/p>\n","protected":false},"author":1,"featured_media":6724,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"googlesitekit_rrm_CAowu7GVCw:productID":"","_crdt_document":"","activitypub_content_warning":"","activitypub_content_visibility":"","activitypub_max_image_attachments":3,"activitypub_interaction_policy_quote":"anyone","activitypub_status":"federate","footnotes":""},"categories":[43],"tags":[13271,13268,2146,722,6156,3597,3599,13267,4052,3601,8431,3596,8430,13270],"class_list":["post-6723","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","tag-alexander-supertramp","tag-christopher-patrick-hawkins","tag-computer-security","tag-creative-commons","tag-cyberattack","tag-cybercrime","tag-cyberwarfare","tag-evil-twin","tag-internet-security","tag-malware","tag-phishing","tag-security-breaches","tag-social-engineering","tag-supply-chain-attack"],"featured_image_src":"https:\/\/mpelembe.net\/wp-content\/uploads\/2024\/10\/file-20241007-15-5igl65-1024x813.jpg","blog_images":{"medium":"https:\/\/mpelembe.net\/wp-content\/uploads\/2024\/10\/file-20241007-15-5igl65-300x238.jpg","large":"https:\/\/mpelembe.net\/wp-content\/uploads\/2024\/10\/file-20241007-15-5igl65-1024x813.jpg"},"ams_acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>As an ethical hacker, I can\u2019t believe the risks people routinely take when they access the internet in\u00a0public - Mpelembe Network<\/title>\n<meta name=\"description\" content=\"If you\u2019re tempted to do a make a couple of cheeky payments while waiting for the band to come on, think again.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/mpelembe.net\/index.php\/as-an-ethical-hacker-i-cant-believe-the-risks-people-routinely-take-when-they-access-the-internet-in-public\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"As an ethical hacker, I can\u2019t believe the risks people routinely take when they access the internet in\u00a0public - Mpelembe Network\" \/>\n<meta property=\"og:description\" content=\"If you\u2019re tempted to do a make a couple of cheeky payments while waiting for the band to come on, think again.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/mpelembe.net\/index.php\/as-an-ethical-hacker-i-cant-believe-the-risks-people-routinely-take-when-they-access-the-internet-in-public\/\" \/>\n<meta property=\"og:site_name\" content=\"Mpelembe Network\" \/>\n<meta property=\"article:published_time\" content=\"2024-10-12T15:34:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/mpelembe.net\/wp-content\/uploads\/2024\/10\/file-20241007-15-5igl65.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1525\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/mpelembe.net\\\/index.php\\\/as-an-ethical-hacker-i-cant-believe-the-risks-people-routinely-take-when-they-access-the-internet-in-public\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/mpelembe.net\\\/index.php\\\/as-an-ethical-hacker-i-cant-believe-the-risks-people-routinely-take-when-they-access-the-internet-in-public\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/mpelembe.net\\\/#\\\/schema\\\/person\\\/2421ebbf3150931b1066b10a196d7608\"},\"headline\":\"As an ethical hacker, I can\u2019t believe the risks people routinely take when they access the internet in\u00a0public\",\"datePublished\":\"2024-10-12T15:34:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/mpelembe.net\\\/index.php\\\/as-an-ethical-hacker-i-cant-believe-the-risks-people-routinely-take-when-they-access-the-internet-in-public\\\/\"},\"wordCount\":725,\"image\":{\"@id\":\"https:\\\/\\\/mpelembe.net\\\/index.php\\\/as-an-ethical-hacker-i-cant-believe-the-risks-people-routinely-take-when-they-access-the-internet-in-public\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/mpelembe.net\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/file-20241007-15-5igl65.jpg\",\"keywords\":[\"Alexander Supertramp\",\"Christopher Patrick Hawkins\",\"Computer security\",\"Creative Commons\",\"Cyberattack\",\"Cybercrime\",\"Cyberwarfare\",\"Evil twin\",\"Internet security\",\"Malware\",\"Phishing\",\"Security breaches\",\"Social engineering\",\"Supply chain attack\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/mpelembe.net\\\/index.php\\\/as-an-ethical-hacker-i-cant-believe-the-risks-people-routinely-take-when-they-access-the-internet-in-public\\\/\",\"url\":\"https:\\\/\\\/mpelembe.net\\\/index.php\\\/as-an-ethical-hacker-i-cant-believe-the-risks-people-routinely-take-when-they-access-the-internet-in-public\\\/\",\"name\":\"As an ethical hacker, I can\u2019t believe the risks people routinely take when they access the internet in\u00a0public - Mpelembe Network\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/mpelembe.net\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/mpelembe.net\\\/index.php\\\/as-an-ethical-hacker-i-cant-believe-the-risks-people-routinely-take-when-they-access-the-internet-in-public\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/mpelembe.net\\\/index.php\\\/as-an-ethical-hacker-i-cant-believe-the-risks-people-routinely-take-when-they-access-the-internet-in-public\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/mpelembe.net\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/file-20241007-15-5igl65.jpg\",\"datePublished\":\"2024-10-12T15:34:25+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/mpelembe.net\\\/#\\\/schema\\\/person\\\/2421ebbf3150931b1066b10a196d7608\"},\"description\":\"If you\u2019re tempted to do a make a couple of cheeky payments while waiting for the band to come on, think again.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/mpelembe.net\\\/index.php\\\/as-an-ethical-hacker-i-cant-believe-the-risks-people-routinely-take-when-they-access-the-internet-in-public\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/mpelembe.net\\\/index.php\\\/as-an-ethical-hacker-i-cant-believe-the-risks-people-routinely-take-when-they-access-the-internet-in-public\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/mpelembe.net\\\/index.php\\\/as-an-ethical-hacker-i-cant-believe-the-risks-people-routinely-take-when-they-access-the-internet-in-public\\\/#primaryimage\",\"url\":\"https:\\\/\\\/mpelembe.net\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/file-20241007-15-5igl65.jpg\",\"contentUrl\":\"https:\\\/\\\/mpelembe.net\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/file-20241007-15-5igl65.jpg\",\"width\":1920,\"height\":1525},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/mpelembe.net\\\/index.php\\\/as-an-ethical-hacker-i-cant-believe-the-risks-people-routinely-take-when-they-access-the-internet-in-public\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/mpelembe.net\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"As an ethical hacker, I can\u2019t believe the risks people routinely take when they access the internet in\u00a0public\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/mpelembe.net\\\/#website\",\"url\":\"https:\\\/\\\/mpelembe.net\\\/\",\"name\":\"Mpelembe Network\",\"description\":\"Collaboration Platform\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/mpelembe.net\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/mpelembe.net\\\/#\\\/schema\\\/person\\\/2421ebbf3150931b1066b10a196d7608\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c66a2765397adfb52418f6f2310640167a0af23ce662da1b68c8a0b8650de556?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c66a2765397adfb52418f6f2310640167a0af23ce662da1b68c8a0b8650de556?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c66a2765397adfb52418f6f2310640167a0af23ce662da1b68c8a0b8650de556?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/mpelembe.net\"],\"url\":\"https:\\\/\\\/mpelembe.net\\\/index.php\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"As an ethical hacker, I can\u2019t believe the risks people routinely take when they access the internet in\u00a0public - Mpelembe Network","description":"If you\u2019re tempted to do a make a couple of cheeky payments while waiting for the band to come on, think again.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/mpelembe.net\/index.php\/as-an-ethical-hacker-i-cant-believe-the-risks-people-routinely-take-when-they-access-the-internet-in-public\/","og_locale":"en_US","og_type":"article","og_title":"As an ethical hacker, I can\u2019t believe the risks people routinely take when they access the internet in\u00a0public - Mpelembe Network","og_description":"If you\u2019re tempted to do a make a couple of cheeky payments while waiting for the band to come on, think again.","og_url":"https:\/\/mpelembe.net\/index.php\/as-an-ethical-hacker-i-cant-believe-the-risks-people-routinely-take-when-they-access-the-internet-in-public\/","og_site_name":"Mpelembe Network","article_published_time":"2024-10-12T15:34:25+00:00","og_image":[{"width":1920,"height":1525,"url":"https:\/\/mpelembe.net\/wp-content\/uploads\/2024\/10\/file-20241007-15-5igl65.jpg","type":"image\/jpeg"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/mpelembe.net\/index.php\/as-an-ethical-hacker-i-cant-believe-the-risks-people-routinely-take-when-they-access-the-internet-in-public\/#article","isPartOf":{"@id":"https:\/\/mpelembe.net\/index.php\/as-an-ethical-hacker-i-cant-believe-the-risks-people-routinely-take-when-they-access-the-internet-in-public\/"},"author":{"name":"admin","@id":"https:\/\/mpelembe.net\/#\/schema\/person\/2421ebbf3150931b1066b10a196d7608"},"headline":"As an ethical hacker, I can\u2019t believe the risks people routinely take when they access the internet in\u00a0public","datePublished":"2024-10-12T15:34:25+00:00","mainEntityOfPage":{"@id":"https:\/\/mpelembe.net\/index.php\/as-an-ethical-hacker-i-cant-believe-the-risks-people-routinely-take-when-they-access-the-internet-in-public\/"},"wordCount":725,"image":{"@id":"https:\/\/mpelembe.net\/index.php\/as-an-ethical-hacker-i-cant-believe-the-risks-people-routinely-take-when-they-access-the-internet-in-public\/#primaryimage"},"thumbnailUrl":"https:\/\/mpelembe.net\/wp-content\/uploads\/2024\/10\/file-20241007-15-5igl65.jpg","keywords":["Alexander Supertramp","Christopher Patrick Hawkins","Computer security","Creative Commons","Cyberattack","Cybercrime","Cyberwarfare","Evil twin","Internet security","Malware","Phishing","Security breaches","Social engineering","Supply chain attack"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/mpelembe.net\/index.php\/as-an-ethical-hacker-i-cant-believe-the-risks-people-routinely-take-when-they-access-the-internet-in-public\/","url":"https:\/\/mpelembe.net\/index.php\/as-an-ethical-hacker-i-cant-believe-the-risks-people-routinely-take-when-they-access-the-internet-in-public\/","name":"As an ethical hacker, I can\u2019t believe the risks people routinely take when they access the internet in\u00a0public - Mpelembe Network","isPartOf":{"@id":"https:\/\/mpelembe.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/mpelembe.net\/index.php\/as-an-ethical-hacker-i-cant-believe-the-risks-people-routinely-take-when-they-access-the-internet-in-public\/#primaryimage"},"image":{"@id":"https:\/\/mpelembe.net\/index.php\/as-an-ethical-hacker-i-cant-believe-the-risks-people-routinely-take-when-they-access-the-internet-in-public\/#primaryimage"},"thumbnailUrl":"https:\/\/mpelembe.net\/wp-content\/uploads\/2024\/10\/file-20241007-15-5igl65.jpg","datePublished":"2024-10-12T15:34:25+00:00","author":{"@id":"https:\/\/mpelembe.net\/#\/schema\/person\/2421ebbf3150931b1066b10a196d7608"},"description":"If you\u2019re tempted to do a make a couple of cheeky payments while waiting for the band to come on, think again.","breadcrumb":{"@id":"https:\/\/mpelembe.net\/index.php\/as-an-ethical-hacker-i-cant-believe-the-risks-people-routinely-take-when-they-access-the-internet-in-public\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/mpelembe.net\/index.php\/as-an-ethical-hacker-i-cant-believe-the-risks-people-routinely-take-when-they-access-the-internet-in-public\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mpelembe.net\/index.php\/as-an-ethical-hacker-i-cant-believe-the-risks-people-routinely-take-when-they-access-the-internet-in-public\/#primaryimage","url":"https:\/\/mpelembe.net\/wp-content\/uploads\/2024\/10\/file-20241007-15-5igl65.jpg","contentUrl":"https:\/\/mpelembe.net\/wp-content\/uploads\/2024\/10\/file-20241007-15-5igl65.jpg","width":1920,"height":1525},{"@type":"BreadcrumbList","@id":"https:\/\/mpelembe.net\/index.php\/as-an-ethical-hacker-i-cant-believe-the-risks-people-routinely-take-when-they-access-the-internet-in-public\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/mpelembe.net\/"},{"@type":"ListItem","position":2,"name":"As an ethical hacker, I can\u2019t believe the risks people routinely take when they access the internet in\u00a0public"}]},{"@type":"WebSite","@id":"https:\/\/mpelembe.net\/#website","url":"https:\/\/mpelembe.net\/","name":"Mpelembe Network","description":"Collaboration Platform","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/mpelembe.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/mpelembe.net\/#\/schema\/person\/2421ebbf3150931b1066b10a196d7608","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/c66a2765397adfb52418f6f2310640167a0af23ce662da1b68c8a0b8650de556?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c66a2765397adfb52418f6f2310640167a0af23ce662da1b68c8a0b8650de556?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c66a2765397adfb52418f6f2310640167a0af23ce662da1b68c8a0b8650de556?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/mpelembe.net"],"url":"https:\/\/mpelembe.net\/index.php\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/mpelembe.net\/index.php\/wp-json\/wp\/v2\/posts\/6723","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mpelembe.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mpelembe.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mpelembe.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mpelembe.net\/index.php\/wp-json\/wp\/v2\/comments?post=6723"}],"version-history":[{"count":1,"href":"https:\/\/mpelembe.net\/index.php\/wp-json\/wp\/v2\/posts\/6723\/revisions"}],"predecessor-version":[{"id":6725,"href":"https:\/\/mpelembe.net\/index.php\/wp-json\/wp\/v2\/posts\/6723\/revisions\/6725"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mpelembe.net\/index.php\/wp-json\/wp\/v2\/media\/6724"}],"wp:attachment":[{"href":"https:\/\/mpelembe.net\/index.php\/wp-json\/wp\/v2\/media?parent=6723"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mpelembe.net\/index.php\/wp-json\/wp\/v2\/categories?post=6723"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mpelembe.net\/index.php\/wp-json\/wp\/v2\/tags?post=6723"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}