Things to pay attention to when using public WiFi

Things to pay attention to when using public WiFi

We are happy to get free WiFi and start opening online accounts. Some people even do important things. It is important to exercise caution when using free WiFi in public places.

Meanwhile, the Nepal Telecommunications Authority, Nepal's regulatory body for the telecommunications sector, has suggested the following precautions to be taken when using public WiFi.

1. Recognize the official WiFi name in shopping malls, hotels, airports, restaurants, coffee shops, public transport, etc., and use the Internet using the password provided with the WiFi. Be aware that hackers can create free public WiFi that looks the same.

2. Turn off the file-sharing option of your mobile, laptop, computer, tablet, etc. when connected to any public WiFi (free public WiFi). Also, always keep the firewall options on laptops and computer devices.

3. Do not use the Internet using open WiFi, which is not password protected.

4. Use VPN (Virtual Private Network) whenever possible to access the Internet using public WiFi and hotspots.

5. When using the Internet using public WiFi and hotspots, browse only encrypted (HTTPS) websites as much as possible.

6. When using the Internet using public WiFi and hotspots, do not open online banking, social networking, etc. mobile apps and sites with personal sensitive details.

7. Use your mobile's 3G and 4G data when you need to open such mobile apps and sites with personal sensitive details.

8. After using public WiFi, log out immediately from every website and portal you are logged into.

9. Delete the browsing history and web cache you've visited after using the Internet using a terminal and computer available in a public place.

10. Mandatory antivirus on public WiFi and network-connected devices (mobiles, laptops, computers, tablets).

11. Turn off your device's Wi-Fi or Bluetooth connectivity when you're not using your mobile, laptop, computer, or tablet. Also, use manual mode instead of WiFi auto connection.

12. Don't do financial transactions over public WiFi or networks. Also, when using public WiFi/network, do not do any business related to your details like password, OTP, bank account number, pin code, receiving token.

13. Use at least two-factor authentication (2FA) to secure your digital account (digital account), email account, etc.

14. Do not use public WiFi on older and outdated devices as they can be risky.

Another name for the cyber challenge is 'Man in the Middle Attack'.

 With the increasing use of the internet and digital, various forms of cybercrime have started appearing. With more than half of the world's population connected online, cyber-attacks are becoming one of the biggest challenges in today's world.

Incidents of stealing confidential data and causing financial loss by giving unauthorized access to the online accounts of individuals and organizations are happening every day.

Man in the Middle Attack (MITM) is emerging as another election among the various incidents on the internet.

In this attack, a third party (hacker) enters between the sender and the receiver and receives all the messages from the sender (such as password, personal information, banking information, your confidential information, etc.) Sends to recipients by making changes to their liking.

Also, the message received from the receiver is sent to the sender by changing it to your liking. That is, a third party (hacker) can receive all the messages between the sender and the receiver and misuse them by making changes to his liking.

How does 'Man in the Middle Attack' work?

Man in the middle attack occurs in two stages, the first of which is that the cybercriminal receives your information before the Internet traffic for the man in the middle attack reaches the destination. Which is called interception.

To complete the interception, cybercriminals use IP snooping, ARP snooping, DNS snooping, etc.

The second is that after the cybercriminal succeeds in completing the interception task, the interception traffic receives the original content of the traffic in the second stage using methods like HTTPS Snooping, SSL Best, SSL Hijack, SSL Stripping, etc.

How to avoid 'Man in the Middle Attack'?

Take the following steps to avoid a man-in-the-middle attack:

1. Encrypt and send data through a Secure Channel to securely transfer your data.

2. Use Firewall / IPS / IDS on your computer / laptop / mobile and network.

3. Don't use unsafe public WiFi. Use WPA2 / 3 mode even on home WiFi and keep WPS disabled.

4. Only do online transactions using the Force TLS (automatically using HTTPS) plugin in the browser.

5. Let's use SSL / TLS / PGP / GPG encryption setting for secure email.

6. Let's use a website with a URL with HTTPS or Lock Icon.

7. Let's constantly update our software (Operating System, Application Software, Browser).

8. Use Reputed Antivirus to prevent malware activity on your computer/laptop / mobile device.

9. Don't download unsafe software, apps, freeware. Also, don't use unencrypted/plain text messaging apps.

10. Do not send your Password, OTP, Bank Account Number, PIN details by email.

News Impact: Cannot call mobile number from Skype-Viber, recharge sale action

The Nepal Telecommunications Authority (NTAA) has ruled that making calls to mobile networks and landlines from apps such as Viber and WhatsApp is illegal. The regulatory body has issued such information after Tekpana published the news that an invisible call is also generated from such service.

Recharge cards that can be used to call mobile numbers and landline numbers are being sold in Nepal through apps like Viber and WhatsApp. Saying that it is understood from the features like Viber Out and Skype Out that the telecommunication service providers of Nepal are communicating on mobile networks and landline telephones, NEA has clarified that such action would be against the Telecommunications Act and rules.

The regulator has warned not to do such a thing and has warned to take action according to the law in case of disobedience. Earlier on Sunday, Tekpana had published a news item titled 'Recharge of phones that do not show numbers when calls and messages are being sold openly, the government is unaware'.

Lately, the terror of calls from unknown and private numbers (the number of the recipient's mobile phone is not visible) has increased alarmingly. The call comes, the number is not visible. A message arrives, but not sure who sent it.

The Cyber ​​Bureau of Nepal Police has been saying that the incidents of intimidation, threats, and blackmailing of the public by calling and texting from such numbers have increased. Recharges for making invisible calls and sending messages are being sold openly through some online markets in Nepal. The name is 'Skype Credit'.

With such a 'credit' purchase, you can easily make invisible calls and send messages from Microsoft's Skype app, which is known for messaging and video calling.

Tokyo Olympics medal made using 79,000 tons of electronic devices including mobile phones

Winning medals at the Games Aquarius Olympics is more important than winning medals at other international sports. An Olympic medal is an even bigger dream, especially for athletes.

This time the medal that the winners of the Olympics taking place in Japan have become even more special. This year's Olympic gold, silver, and bronze medals are made from useless mobile phones and other electronic devices.

It took the Tokyo Olympic Organizing Committee two years to collect 78,985 tons of electronic devices, including 6,021,000 mobile phones.

Japan has made 5,000 Olympic medals from these electronic devices.

This is the first time in the history of the Olympics that medals have been made by recycling metal. This is also the first time that ordinary people have been used to make these medals.

This year's medals are seen as part of the Tokyo Olympics recycling campaign. Recycled cardboards have also been used in the accommodation designed for this time's Olympic participants.