• RSS
  • Register
    Login
SWNSdigital
  • Home
  • Stories
    • Health and Nutrition
    • Science & Technology
    • Lifestyle
    • Family
    • Work & Careers
    • Business and Money
    • Food
No Result
View All Result
  • Home
  • Stories
    • Health and Nutrition
    • Science & Technology
    • Lifestyle
    • Family
    • Work & Careers
    • Business and Money
    • Food
No Result
View All Result
SWNSdigital
No Result
View All Result

Brits are gambling with their personal data by ‘blindly’ accessing Wi-Fi hotspots

29 July 2019
in Science & Technology
Home Science & Technology
Share on FacebookShare on TwitterShare on Reddit

News Copy

Millions of Brits have gambled with their personal data by ‘blindly’ accessing Wi-Fi hotspots, according to a study.

One in five have taken ‘significant risks’ by failing to check if public Wi-Fi connections are legitimate - instead using hotspots which are free, seem to be credible and offer fast speeds.

Worryingly, users could be connecting to ‘fake Wi-Fi’ hotspots which can appear to be reputable but allow cybercriminals to eavesdrop on users and steal usernames, passwords and bank details.

These Wi-Fi connections, which often have innocuous sounding names such as ‘airport Wi-Fi’ or ‘hotel Wi-Fi’, can also redirect victims to malicious malware sites and phishing sites.

Commissioned by cybersecurity company, BullGuard [www.bullguard.com], the research of 2,000 adults found seven in 10 have used free public Wi-Fi.

And of those who have done so, more than a third have entered passwords, a fifth have used credit cards and 31 per cent have accessed online banking – all data hackers are after.

Paul Lipman, CEO at BullGuard, said: “Consumers are choosing convenience over safety when using public Wi-Fi.

“Hackers can easily set up malicious hotspots which appear to be legitimate and yet can intercept and record people’s personal data.

“This allows them to steal usernames, passwords, credit card details, bank account information and more.”

The research also found two thirds of public Wi-Fi users have set up their devices to automatically connect to the nearest hotspot – putting their personal details on the line.

Paul Lipman added: “If your device is set up this way, and if you're not paying attention when you first choose a hotspot, even once, and you accidentally choose something malicious, your device will automatically select it every time it is within range.”

Further to this, four in 10 users habitually connect to hotspots with a name reflecting the location they are in such as ‘library Wi-Fi’ or ‘restaurant Wi-Fi’ – again this could be a risky move.

But despite taking gambles like these when using public Wi-Fi, the BullGuard study carried out through OnePoll found 62 per cent are ‘afraid’ their devices will be hacked.

The biggest worries are theft of bank details (68 per cent) and passwords (56 per cent) – followed by personal emails being accessed (27 per cent).

Paul Lipman said: “The findings show that respondents do not feel safe online, yet they are ignoring their fears and are using hotspots without checking they are safe.”

The research also identified confusion around staying safe when using public Wi-Fi - almost half are mistakenly under the impression antivirus software will protect their data.

Paul Lipman added: “Although essential for detecting and removing malware from your device, antivirus offers no protection at all from having your data intercepted by a malicious hotspot.”

“But a Virtual Private Network (VPN) is an effective way of keeping you safe online when using public Wi-Fi.

“It creates a secure connection tunnel between your device and the websites and services you are accessing to keep you safe whether you’re using a smartphone or laptop on public Wi-Fi in a café, or if you want to check online banking accounts from an airport or hotel.”

Amid this, six in 10 admitted they don’t use Virtual Private Networks (VPNs) when connecting to hotspots and 57 per cent believe they are ‘too complicated’ to use.

TOP ACTIVITIES CARRIED OUT WHILST ON PUBLIC WI-FI:

1. Logging into a personal email account (42 per cent)
2. Using Social Media or any other account with auto login (36 per cent)
3. Logging into any account requiring a password (31 per cent)
4. Filling in forms with personal details - e.g. name, address, date of birth, telephone number (18 per cent)
5. Online banking (17 per cent)

MOST POPULAR PLACES TO USE PUBLIC WI-FI:

1. Hotels (53 per cent)
2. Coffee shops/restaurants (51 per cent)
3. Airports (48 per cent)
4. Public transport (37 per cent)
5. Retail shops (31 per cent)

STAYING SAFE ON PUBLIC WI-FI NETWORKS:

TERMS OF SERVICE

The majority of genuine public networks will ask the user to agree to their terms of service before linking up.

Instead, if you gain immediate access to unrestricted browsing tread carefully - it could be a rogue access point.

BEWARE OF ‘FREE’

Fake public Wi-Fi hotspots typically copy public domain names and add the word ‘free’ as a hook to lure users.

For example, if you’re in a coffee shop, you might see two Wi-Fi options - one called 'Coffee Shop Wi-Fi ' and the other called 'Free Coffee Shop Wi-Fi '.

One of these could be a malicious network and it’s likely to be the free one -
if you’re not sure ask an employee.

WRONG PASSWORDS

If you purposely enter a wrong password to a password protected hotspot and you don’t get an error message the access point is likely fake.

Fake hotspots will commonly let anyone access them regardless of the password entered.

SLOW NETWORK CONNECTIONS

Look out for very slow network connections.

This could be a sign the hacker is using mobile internet to connect you to the web using the fake hotspot.

SECURE WEBSITES

Pay attention to the address bar of the websites you visit.

If for instance a banking website shows HTTP instead of HTTPS - your connection is unsafe.

HTTPS with a padlock symbol means data is encrypted.

HTTP connections without a padlock are unsafe.

USE VPNS

Always use a VPN such as BullGuard VPN on your tablet, phone or laptop.

The VPN tunnel stops people from seeing what you are doing and VPN encryption scrambles your data rendering it useless to hackers.

WHAT IF YOU CONNECT TO A POTENTIAL FAKE HOTSPOT

If you suspect you have connected to a compromised hotspot, follow these steps:

• Disconnect as quickly as possible.
• Clear your list of saved Wi-Fi connections to avoid connecting to the same one in the future.
• Clear your browser cache.
• Run antivirus and malware checks.
• Change the password to any site you logged in to, and any other websites that use the same login information.
• Call your bank and cancel any bank cards if you used them over the connection.
ENDS


Previous Post

Over half of Brits feel face-to-face flattery is ‘dying out’ as the digital age takes over

Next Post

These are the incredible innovations which will be commonplace in the homes of the future

Next Post
These are the incredible innovations which will be commonplace in the homes of the future

These are the incredible innovations which will be commonplace in the homes of the future

  • Home
  • Archive
  • Terms & Conditions
  • Privacy Policy

© 2025 72Point

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Home
  • All releases

© 2025 72Point

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies. However you may visit Cookie Settings to provide a controlled consent.
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
AWSALBCORS7 daysAmazon Web Services set this cookie for load balancing.
AWSELBsessionAssociated with Amazon Web Services and created by Elastic Load Balancing, AWSELB cookie is used to manage sticky sessions across production servers.
cookielawinfo-checkbox-advertisement1 yearSet by the GDPR Cookie Consent plugin, this cookie records the user consent for the cookies in the "Advertisement" category.
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
CookieLawInfoConsent1 yearCookieYes sets this cookie to record the default button state of the corresponding category and the status of CCPA. It works only in coordination with the primary cookie.
crumbsessionSquarespace sets this cookie to prevent cross-site request forgery (CSRF).
JSESSIONIDsessionNew Relic uses this cookie to store a session identifier so that New Relic can monitor session counts for an application.
lvapp_session6 hoursLinkedin sets this cookie to allow the forms to function within the website.
rc::aneverThis cookie is set by the Google recaptcha service to identify bots to protect the website against malicious spam attacks.
rc::csessionThis cookie is set by the Google recaptcha service to identify bots to protect the website against malicious spam attacks.
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
wpEmojiSettingsSupportssessionWordPress sets this cookie when a user interacts with emojis on a WordPress site. It helps determine if the user's browser can display emojis properly.
XSRF-TOKEN6 hoursWix set this cookie for security purposes.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
CookieDurationDescription
yt-player-bandwidthneverThe yt-player-bandwidth cookie is used to store the user's video player preferences and settings, particularly related to bandwidth and streaming quality on YouTube.
yt-player-headers-readableneverThe yt-player-headers-readable cookie is used by YouTube to store user preferences related to video playback and interface, enhancing the user's viewing experience.
yt-player-webgl-spherical-3d-display-modesessionThe yt-player-webgl-spherical-3d-display-mode cookie is likely used by YouTube to remember user preferences related to the playback of 3D videos using WebGL technology.
yt-remote-cast-availablesessionThe yt-remote-cast-available cookie is used to store the user's preferences regarding whether casting is available on their YouTube video player.
yt-remote-cast-installedsessionThe yt-remote-cast-installed cookie is used to store the user's video player preferences using embedded YouTube video.
yt-remote-fast-check-periodsessionThe yt-remote-fast-check-period cookie is used by YouTube to store the user's video player preferences for embedded YouTube videos.
yt-remote-session-appsessionThe yt-remote-session-app cookie is used by YouTube to store user preferences and information about the interface of the embedded YouTube video player.
yt-remote-session-namesessionThe yt-remote-session-name cookie is used by YouTube to store the user's video player preferences using embedded YouTube video.
ytidb::LAST_RESULT_ENTRY_KEYneverThe cookie ytidb::LAST_RESULT_ENTRY_KEY is used by YouTube to store the last search result entry that was clicked by the user. This information is used to improve the user experience by providing more relevant search results in the future.
__cf_bm30 minutesCloudflare set the cookie to support Cloudflare Bot Management.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
CookieDurationDescription
AWSALB7 daysAWSALB is an application load balancer cookie set by Amazon Web Services to map the session to the target.
SRM_B1 year 24 daysUsed by Microsoft Advertising as a unique ID for visitors.
swpm_sessionsessionThis cookie is set by the Simple WordPress Membership Plugin. This cookie is used for membership login session and to provide access to the protected content on the website.This cookie keeps the login records so user don't want to authorise each time while moving to next page.
_gat1 minuteGoogle Universal Analytics sets this cookie to restrain request rate and thus limit data collection on high-traffic sites.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
CookieDurationDescription
ajs_anonymous_idneverThis cookie is set by Segment to count the number of people who visit a certain site by tracking if they have visited before.
ajs_group_idneverThis cookie is set by Segment to track visitor usage and events within the website.
ajs_user_idneverThis cookie is set by Segment to help track visitor usage, events, target marketing, and also measure application performance and stability.
attribution_user_id1 yearThis cookie is set by Typeform for usage statistics and is used in context with the website's pop-up questionnaires and messengering.
CLID1 yearMicrosoft Clarity set this cookie to store information about how visitors interact with the website. The cookie helps to provide an analysis report. The data collection includes the number of visitors, where they visit the website, and the pages visited.
CONSENT2 yearsYouTube sets this cookie via embedded YouTube videos and registers anonymous statistical data.
MR7 daysThis cookie, set by Bing, is used to collect user information for analytics purposes.
SMsessionMicrosoft Clarity cookie set this cookie for synchronizing the MUID across Microsoft domains.
vuid1 year 1 month 4 daysVimeo installs this cookie to collect tracking information by setting a unique ID to embed videos on the website.
_ga1 year 1 month 4 daysGoogle Analytics sets this cookie to calculate visitor, session and campaign data and track site usage for the site's analytics report. The cookie stores information anonymously and assigns a randomly generated number to recognise unique visitors.
_gat_gtag_UA_*1 minuteGoogle Analytics sets this cookie to store a unique user ID.
_ga_*1 year 1 month 4 daysGoogle Analytics sets this cookie to store and count page views.
_gid1 dayGoogle Analytics sets this cookie to store information on how visitors use a website while also creating an analytics report of the website's performance. Some of the collected data includes the number of visitors, their source, and the pages they visit anonymously.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
CookieDurationDescription
ANONCHK10 minutesThe ANONCHK cookie, set by Bing, is used to store a user's session ID and verify ads' clicks on the Bing search engine. The cookie helps in reporting and personalization as well.
idsessionSet by Google DoubleClick, this cookie is used to create user profiles to display relevant ads.
IDE1 year 24 daysGoogle DoubleClick IDE cookies store information about how the user uses the website to present them with relevant ads according to the user profile.
muc_ads1 year 1 month 4 daysTwitter sets this cookie to collect user behaviour and interaction data to optimize the website.
MUID1 year 24 daysBing sets this cookie to recognise unique web browsers visiting Microsoft sites. This cookie is used for advertising, site analytics, and other operations.
personalization_id1 year 1 month 4 daysTwitter sets this cookie to integrate and share features for social media and also store information about how the user uses the website, for tracking and targeting.
PREF8 monthsPREF cookie is set by Youtube to store user preferences like language, format of search results and other customizations for YouTube Videos embedded in different sites.
rl_anonymous_idneverRudderStack set this cookie to store statistical data of users' behaviour on the website, which can be used for internal analytics by the website operator.
rl_group_idneverRudderStack sets this cookie to collect user activity on the web.
rl_group_traitneverRudderstack sets this cookie, which is used to store performed actions on the website.
rl_page_init_referrerneverRudderstack sets this cookie, which is used to store performed actions on the website.
rl_page_init_referring_domainneverRudderstack sets this cookie, which is used to store performed actions on the website.
rl_traitneverRudderstack sets this cookie, which is used to store performed actions on the website.
rl_user_idneverRudderStack set this cookie to store a unique user ID for the Marketing/Tracking purpose.
test_cookie15 minutesdoubleclick.net sets this cookie to determine if the user's browser supports cookies.
VISITOR_INFO1_LIVE5 months 27 daysYouTube sets this cookie to measure bandwidth, determining whether the user gets the new or old player interface.
YSCsessionYoutube sets this cookie to track the views of embedded videos on Youtube pages.
yt-remote-connected-devicesneverYouTube sets this cookie to store the user's video preferences using embedded YouTube videos.
yt-remote-device-idneverYouTube sets this cookie to store the user's video preferences using embedded YouTube videos.
yt.innertube::nextIdneverYouTube sets this cookie to register a unique ID to store data on what videos from YouTube the user has seen.
yt.innertube::requestsneverYouTube sets this cookie to register a unique ID to store data on what videos from YouTube the user has seen.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
CookieDurationDescription
aff1 monthNo description available.
AWSALBAPP-07 daysDescription is currently not available.
AWSALBAPP-17 daysDescription is currently not available.
AWSALBAPP-27 daysDescription is currently not available.
AWSALBAPP-37 daysDescription is currently not available.
AWSALBTG7 daysAssociated with Amazon Web Services.
AWSALBTGCORS7 daysAssociated with Amazon Web Services.
caf_ipaddrsessionNo description available.
citysessionNo description available.
countrysessionNo description available.
debugneverNo description available.
jnews_view_counter_visits[0]less than a minuteJNews theme sets this cookie to store and count page views.
kmt_ex2 months 23 daysDescription is currently not available.
kmt_rid1 monthDescription is currently not available.
kmt_sesssessionDescription is currently not available.
kmt_sess.sigsessionDescription is currently not available.
lander_typesessionDescription is currently not available.
loglevelneverNo description available.
pwvisitor1 monthNo description available.
sitesessionDescription is currently not available.
tf_respondent_cc6 monthsDescription is currently not available.
traffic_targetsessionNo description available.
VISITOR_PRIVACY_METADATA5 months 27 daysDescription is currently not available.
_cfuvidsessionDescription is currently not available.
__Secure-ROLLOUT_TOKEN6 monthsDescription is currently not available.
__tad10 yearsNo description available.
Save & Accept
Powered by CookieYes Logo