logo
Public WiFi Warning Issued For All iPhone And Android Users

Public WiFi Warning Issued For All iPhone And Android Users

Forbes6 days ago
Be careful how you connect.
There's no subject guaranteed to rile cybersecurity experts more than public WiFi security — not even the mythological horrors of juice jacking. Any suggestion users should beware connecting to one of the tens of millions of airport, hotel, mall and coffee shop hotspots will always spawn a tirade of sarcastic posts on social media.
But sometimes the threat is real. Your devices can become 'serious liabilities,' the security team at Zimperium has just warned, 'especially during travel, when vigilance is low, free public-WiFi are everywhere, and attackers know exactly how to strike.'
Let's be very clear. Public WiFi is broadly fine. As long as the network is real, you are using encrypted apps or websites, and you don't download any software or overshare any information with the captive portal that pops up asking you to connect.
The FTC says as much: 'Because of the widespread use of encryption, connecting through a public Wi-Fi network is usually safe.'
But even government advice is divisive on this subject, and TSA has a different message: 'Don't use free public WiFi, especially if you're planning to make any online purchases. Do not ever enter any sensitive info while using unsecure WiFi.'
Zimperium says there have been 'over 5 Million Public Unsecured Global Wi-Fi networks found since beginning of 2025, with 33% of users connecting to public unsecured networks.' And that 'during travel, these risks multiply.'
Its warning is aimed at enterprises whose employees will be taking summer vacations with devices that connect to corporate email and other IT systems. 'Airports, hotels, ride-share hubs, and cafés all offer rich hunting grounds for attackers.'
Public WiFi warning.
Zimperium says 'employees, often multitasking or in a hurry, are far more likely to click, install, or connect without thinking twice.' The researchers list four types of attack that users should beware, even as they continue to connect on the go:
Attacks are especially prevalent overseas, but Zimperium also warns that 'major U.S. cities like Los Angeles, New York, Portland, Miami, and Seattle are seeing increased mobile malware activity—particularly during peak travel months.'
Staying safe is fairly straightforward — follow these five golden rules:
You should also avoid installing apps from outside official stores and ensure your OS is up-to-date with the latest security patches. If you're running one of the billion phones with an OS no longer eligible for these updates, you should go get an upgrade.
'Whether you're heading to Southeast Asia or a European business hub,' Zimperium says, 'mobile malware doesn't discriminate by location—but it thrives on opportunity. And summer travel creates plenty of it.'
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Microsoft says Chinese hackers ‘exploited vulnerabilities' in software servers
Microsoft says Chinese hackers ‘exploited vulnerabilities' in software servers

Yahoo

timean hour ago

  • Yahoo

Microsoft says Chinese hackers ‘exploited vulnerabilities' in software servers

Microsoft has said Chinese hackers breached its SharePoint document software servers in a bid to target major corporations and government agencies. The Silicon Valley firm said state-backed 'threat actors' have 'exploited vulnerabilities' in servers used by firms, although its cloud service has not been impacted. It linked the attack to two main groups, Linen Typhoon and Violet Typhoon, and flagged that another China-based group, Storm-2603, had also targeted its systems. Microsoft said in a message to customers that it has since released 'new comprehensive security updates' to deal with the incident. It said it had 'high confidence' that firms who do not install the new security updates could be targeted by the groups. In a statement, the company added: 'Investigations into other actors also using these exploits are still ongoing.' The tech firm said the attackers had been uploading malicious scripts which are then 'enabling the theft of the key material by threat actors'. Bloomberg reported that the US agency responsible for designing nuclear weapons was among those breached in the attack. It also reported that national governments in Europe and the Middle East have also been affected.

Will TSA start allowing liquids? Not so fast, security experts say.
Will TSA start allowing liquids? Not so fast, security experts say.

Washington Post

timean hour ago

  • Washington Post

Will TSA start allowing liquids? Not so fast, security experts say.

At a panel event in Washington last week, Homeland Security Secretary Kristi L. Noem said her agency is considering a change to airport security that would do away with a common passenger annoyance. If the Transportation Security Administration allowed travelers to carry on liquids of more than 3.4 ounces, fliers no longer would have to empty their water bottles or trash full-size containers of shampoo to clear a checkpoint.

Microsoft Rushes To Plug SharePoint Flaws After Wave Of Cyber Intrusions
Microsoft Rushes To Plug SharePoint Flaws After Wave Of Cyber Intrusions

Yahoo

time2 hours ago

  • Yahoo

Microsoft Rushes To Plug SharePoint Flaws After Wave Of Cyber Intrusions

Reports suggest that Chinese?linked hackers exploited two unpatched flaws in on?premises SharePoint to breach around 100 organizations in a single weekend. Microsoft (MFT) rushed out fixes and urged everyone to update right away. On July 19, the Microsoft Security Response Center flagged a spoofing bug (CVE?2025?49706) and a remote code execution hole (CVE?2025?49704) in on?premises SharePoint. Warning! GuruFocus has detected 7 Warning Sign with MSFT. Advanced groups known as Linen Typhoon and Violet Typhoon have been chaining these vulnerabilities to slip into servers, and a less familiar actor called Storm?2603 is now using them too. Their favorite targets include government agencies, think tanks and universities across the U.S., Europe and East Asia. If your IT team hasn't applied the new SharePoint patches, any exposed server is at risk of having data from defense plans to donor lists stolen overnight. Microsoft pointed out that SharePoint Online in Microsoft 365 isn't affected, making the cloud version a safer bet when it comes to rapid security updates. Rolling out fixes is one thing; getting them installed in complex, custom environments is another. Until everyone catches up, expect more breach headlines. This incident is a stark reminder of why many organizations are accelerating moves from traditional on?premises software to cloud?hosted alternatives. This article first appeared on GuruFocus. 擷取數據時發生錯誤 登入存取你的投資組合 擷取數據時發生錯誤 擷取數據時發生錯誤 擷取數據時發生錯誤 擷取數據時發生錯誤

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store