web stats service from statcounter


People are getting more and more mobile. This is made possible with the various gears and devices that are being produced nowadays that allow any individual to connect to the internet even when they are on the go. Mobile laptops are Wi-Fi capable, cell phones have GPRS settings and other devices have built in features that allow its users to be connected wherever they are.

While this is a convenience that makes a lot of people ecstatic, people rarely realize that it also has its own downside. For one reason, connecting your device to hot spots can increase your risk of being a victim of identity theft. If you're doubtful about this statement, read the rest of the article.

Using your laptops in hot spots

Public Wi-Fi hot spots typically do not require passwords for its users to login, as they are public. It can often be found in different establishments like restaurants, hotels, coffee shops, and more. Some establishments require a minimal amount for usage, while others typically offer it totally free of charge. While internet users are happy about these free wi-fi services, internet hackers are ecstatic. In a recent hacker's convention, they (the hackers) illustrated over and over again how easy it was for them to hack wireless networks. When they did, they were able to view what other people (who are connected on the network) were doing.

How is this dangerous? Simple. When other people can see what you are doing, they will be able to view all the personal information that you are keying in on your keyboard and they can use this against you. They can sell it to identity theft criminals who will, either use the information to assume your identity, or sell it other people for more profit. They can also spread virus on the network and your computer system can be seriously at risk.

Using your cell phone on hot spots

Cell phones nowadays have multiple features which make cell phones a necessity. People do not just use cellular phones to make calls or send short messages. They can be also used as alarm clocks, organizer (reminders, to do lists, etc), entertainment (music player and games), multimedia device (camera, video camera, and voice recorder). Cell phones can also be used as your handy internet browser.

Cellphones have features that allow its users to connect online. There are cell phones that have wi-fi capabilities, like that of a laptop's. When you connect your cell phone to hot spots, they can be easily hacked and spywares can be installed on your cell phone without your knowledge. Identity theft can take place when criminals who were able to tap to your cell phone can listen to your conversations and record any personal information that you give out on the process of your conversation.

You cannot rely on the advanced features of your cell phone to keep yourself protected from identity theft. Most low-technology phones are actually more protected as they do not offer much features that can allow hackers to pass through their backdoors and commit identity theft.








Tina L. Douglas is a skilled writer from California. With numerous experiences in the field of writing for several financial institutions, she is greatly qualified across a variety of economic issues. Her notable pieces of writing involve personal credit protection and online identity protection.


20 Nov 2010

0 comments:

Post a Comment

:) :)) ;(( :-) =)) ;( ;-( :d :-d @-) :p :o :>) (o) [-( :-? (p) :-s (m) 8-) :-t :-b b-( :-# =p~ $-) (b) (f) x-) (k) (h) (c) cheer
Click to see the code!
To insert emoticon you must added at least one space before the code.

 
Top