Your Wifi Signals Are Leaking Your Password And Other Sensitive Information

Must Read

Free Netflix in India: A Result of Slow Growth In Q3 2020?

Netflix is testing a new strategy that could lead to free Netflix in India. The online streaming...

Apple iPhone 12: Not For India And You Must Not Fall Prey To Apple’s Marketing Machine

The cat is out from the bag, finally! Apple iPhone 12 has launched in the most sophisticated...

Reliance Jio Set To Blitz The 5G Smartphone Market With Jaw-Dropping Price

Cometh the revolution, cometh Reliance. This time the price of 5G smartphones under the radar of Reliance.

Cyber attack is a potential threat to every internet user. The technology that facilitates connectivity on-the-go, also makes it easy for hackers to infringe data security. A recent demonstration by a group of researchers from the Shanghai Jiao Tong University, the University of South Florida, and the University of Massachusetts at Boston, revealed a new technique that can reveal private information through analyzed radio signal interference using a rogue Wi-Fi hotspot. In a highly advanced manner, a user’s finger movements on a touchscreen phone or a computer’s keyboard are sniffed by the Dubbed Windtalker attack by reading the radio signal patterns called Channel State Information (CSI).

Windtalker Attack is Highly Advanced

While entering any PIN or password or swiping the unlock pattern, finger movement alters the Wi-Fi signal transmitted by the phone, and these movements are imprinted into the signal. When the device is connected to a public Wi-Fi which is controlled by a hacker, they intercept, analyze and reverse engineer these signals to guess the data that was previously entered. The catch here is, this guess work is mostly correct. It doesn’t even require access to the victim’s phone which makes it much more convenient. However, the Windtalker attack works only on a router with multiple antennas that use the Multiple Input Multiple Output (MIMO) technology. MIMO technology allows the router to connect and transmit data from multiple devices simultaneously.

Windtalker Attack Accuracy is Something to Worry About

According to the tests carried out by the researchers in the real world scenario, the accuracy of this attack technique turned out to be 68% accurate. However, the accuracy is different on different mobile phones. The accuracy increases with the user who types more. This helps the attacker in collecting more data. The attacker dupe in the users by providing free Wi-Fi access and in return the user has to finish the online training by clicking the designated numbers. Moreover, they can also mimic text captchas to make the user enter the designated numbers.

Advertisements

Data Breaching is Only Increasing with Technological Advancements

Data breaching is increasing rapidly with advancement in technology. In the first half of 2016, there were 974 publicly disclosed data breaches which led to theft or loss of 554 million data records. It is a 31% increase from 424 million data records which was compromised in the previous six months. Moreover, 52% of the data breaches in H1 2016 couldn’t identify the exact number of data that were compromised. It means that the number might increase significantly from 554 million for H1 2016 when more information about the breach is disclosed or made available. This number can be broken down further in the following manner:

  • 35 records per second
  • 2,116 records per minute
  • 126,936 records per hour
  • 3,046,456 records per day

Attackers are interested in the data as they tend to exploit them for their benefits or trade the data in the dark web against some money. The amount of money depends on the importance of the data. Out of the total 974 breaches, Identity theft attacks alone accounted for 621 incidents (64%) and theft of 294 million data in the first half of 2016. But the most surprising fact is these attacks have increased a huge 38% during the previous six months (H2 2015). The other types of incidents reported were financial access (16%), account access (11%), Existential data (5%) and nuisance (4%). This kind of theft can be used to create fake documents, send messages or emails from the stolen identity, or using it for other wrong purposes.

Based on the industry type, healthcare industry was the most affected with about 263 incidents (27%) of data breaches followed by other (16%), government (14%) and financial industry (12%).

data-breaches-by-industry

Keep Your Data Secure

Several companies, as well as the government, has been working to keep these attacks under control. However, the attackers are always successful in finding out different ways to breach. Companies and government use a three-step approach to keep the data secure. The steps are as follows:

  1. Encrypt the data: All the sensible data whether in physical networks, virtualized environment, the cloud, or in motion, should be encrypted to protect vital information.
  2. Store and Manage Keys: Encryption requires crypto management platform. So, the key should be stored in a vault away from the encrypted data, and a process should be implemented to limit access and reissue of the key.
  3. Control User Access: Strong authentication of the user through a verification process should be implemented, and user access level should be defined to manage user access.

However, safety largely remains in the hands of the users. The user should be careful about their behaviour while browsing the web. The users should follow the usage guidelines. They should try to avoid connecting to unknown public Wi-Fi networks and clicking on unknown links, emails, and messages.

Advertisements

Technology is advancing, and consumers are becoming more and more dependent on the digital world. The chances of becoming victim to cyber-attacks have also increased manifold times. Hence, Internet and Network users should be very careful. After all, prevention is better than cure!

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest News

Can Facebook Be Trusted For Newly Announced Hosting and Shopping Services?

Every coin has two sides. For Facebook Inc. (NASDAQ:FB), the positive side says that it has launched...

When the Going Gets Tough, the Tough Gather Online

Tech shows; we all know them, love them, and wish we could get to them. Unfortunately, that's not always possible. Or is...

Flipkart, Amazon Hurtle To Secure Their Slice in Aditya Birla Fashion

The battle conch for the festive season has already been blown. Now in a bid to take control of a new frontier,...

Jio Pages: The Indian Browser Reliance Is Betting On Now!

Looks like Reliance wants to establish Jio as a synonym of technology. After launching a fleet of Jio products in the last...

Less Than 5% Internet Users In India Have Netflix Subscription

The third-quarter earnings report of Netflix is out; The streaming giant beats the Wall Street expectations in terms of revenue but fell...

Free Netflix in India: A Result of Slow Growth In Q3 2020?

Netflix is testing a new strategy that could lead to free Netflix in India. The online streaming giant is exploring options to...

In-Depth: Dprime

Will ‘TikTok By Microsoft’ Be A Winner?

For the last two years, TikTok has been in the public eye for all sorts of reasons. First, it was the exploded...

Facebook Subscription Model: Looking Beyond Ad Dollars?

Seldom do job listings create a stir this gripping. However, when the job listing in question is a stealth post from Twitter,...

Will The Online Food Delivery Market in India End Up Becoming A Two-Horse Race?

It's pretty much evident that the food delivery space in India is all set to get riled up soon enough as one...

More Articles Like This