Before you take a vacation this August, let’s talk about the rules for practicing safe Internet on the road.
Somewhere along the Kenya-Tanzania border, 8,000 miles and eight time zones from home, I got the news no traveler wants to hear: My email account had been compromised.
The evidence? One of those English-as-a-second-language messages in which I appeared to beg my friends to wire money overseas. It looked like someone had stolen my password.
Perfect timing, I thought, as my computer strained to download the rest of my emails over a faint wireless connection.
I’ve written about this topic several times and use a long list of precautions, so if it can happen to me, it can happen to anyone.
Kaspersky Lab, a global cyber security company, says one in five travelers have been hit by cyber crime while traveling abroad. In other words, it’s open season on the jet set, particularly those who use open, public wireless networks.
“Never trust open Wi-Fi networks that require no passwords,” says Michael Canavan, a Kaspersky senior vice president.
I reviewed the places where I’d logged into an open network. At the airport in Orlando. In Dubai. At the InterContinental in Nairobi. Impossible to tell where it happened.
What’s wrong with an open network? It may be run by bad guys, according to David Balaban, an expert on ransomware.
“Hackers may set up fake Wi-Fi spots masquerading as a genuine hotel network,” he says. “They create duplicate Wi-Fi networks using the hotel’s branded online materials. They use stronger signals and so lure users to connect to them instead of the genuine hotel network.”
Another common error: hitting the road with obsolete operating systems or software. Emmanuel Schalit, the CEO of the password manager Dashlane, says securing a laptop or cell phone is easy.
“Before you go, make sure your devices are updated with the latest versions of your applications, anti-virus, anti-malware and other software updates,” he says. “To protect your devices while on vacation, secure all of your devices with a lengthy PIN number or strong password, and encrypt any data locally stored on those devices.”
I’d done all of that, too.
Ah, but did I use a Virtual Private Network (VPN), which encrypts your data through a server, to access the Internet? I hadn’t, mostly because a VPN can make a slow Internet connection even slower.
“Always use VPN while connected on any public Wi-Fi network,” scolds cyber security expert Sanjay Deo. “This will encrypt your communications and help reduce chances of being hacked.”
In all fairness, once I spotted the apparent hack, I immediately fired up my Buffered.com VPN and used it for the rest of my time in Africa. A slow connection is better than a dangerous one.
Anything else? Yes, says Internet safety expert Darren Guccione. I need to set my smartphone so it self-erases after multiple incorrect logins. I need to activate anti-theft applications such as “find my phone” that allow you to lock the phone if it’s stolen. “So if your phone or tablet is stolen, you can track it, disable it and change all the passwords,” he says.
What else? Had I somehow typed my password on a public computer? No. Had I inadvertently revealed my password to a hacker while on a stopover or in a hotel lobby? Also, no. How about responding to a suspicious email that appeared to be from my bank, a classic phishing attempt? Absolutely not.
So what happened? I received about six emails in total from concerned friends, all with the same message: Send money now. That’s only a tiny fraction of the 10,000-plus contacts in my address book.
A closer look at the signature showed the messages didn’t come from me but were spoofed. That means someone manipulated the email signature to make it look like it came from my address. The six people who received the message were all fellow consumer advocates whose email addresses had apparently been harvested from my website.
This was no computer security breach at the hands of a careless traveler. It was a lesson in being discreet about your travel plans. I’d told a lot of people about my plans to visit Kenya, and one of them decided it would be the perfect time to scam my co-workers.
Do you want to scam a consumer advocate? Good luck with that.
What not to do when you travel:
Post lots of geotagged photos or location updates on social media
They can reveal your current and future travel plans in sufficient detail to give criminals an opening. The latest threat: virtual kidnappings, which are becoming more common in Latin America. When you go camping, into the wilderness or to locations where you may be off the grid, cyber stalkers contact your family, claiming you are their hostage. “They will demand immediately a sum of money, usually affordable and easily wired, and insist that the person stay on the phone, using fear tactics but always aimed at ensuring that their ruse is not discovered,” says Mark Deane, CEO of ETS Risk Management.
Only use HTTPS — Hypertext Transfer Protocol (http) with Secure Sockets Layer (SSL) — when you’re online, especially when you’re on the road. “It’s a more secure option set up by a website that knows security is essential,” says Robert Siciliano CEO of IDTheftSecurity.com. Look for https:// in the address bar, signifying it’s a secure page. Even on an open, unsecured wireless connection, HTTPS is more secure.
Leave your device unattended
“The biggest danger travelers have is losing their devices,” says Jason Hong, a professor at Carnegie Mellon’s School of Computer Science. “Don’t leave your devices unattended in public places, because they can be quickly and easily stolen.” Pro tip: Put your name on your device, in case someone returns it to lost and found. Hong tapes his business card to the bottom of his laptop.
DISCLAIMER: This article expresses my own ideas and opinions. Any information I have shared are from sources that I believe to be reliable and accurate. I did not receive any financial compensation in writing this post, nor do I own any shares in any company I’ve mentioned. I encourage any reader to do their own diligent research first before making any investment decisions.
Tax credits: A new alternative source of revenue
Avoid these oil and gas investment scams
Vishal Sikka resignation sends Infosys stocks reeling
The pros and cons of life admin: Do employees have a choice?
Will Nokia 8 be enough to compete with Samsung and Apple?
The marijuana industry is replacing the alcohol industry and creating jobs
Constitutional facial acupuncture is the safer, more natural anti-aging regimen—here’s why
How IoT is revolutionizing the retail sector
Why Longevity Eastern Medicine is becoming the popular center for holistic health
Highly experienced Doctor of Acupuncture reveals the secret of beauty and longevity (part 2)
Promoting women’s football in Malta by UEFA projects
Euro NCAP marks its 20th anniversary with two crash tests
European Parliament’s International Trade Committee backs CETA
The American Heart Association has released four new PSAs
PwC presents 20th global CEO survey results in Switzerland
Featured3 days ago
Resort Marketing Group settlement: Will you receive anything?
Business1 week ago
Will IBM India’s impenetrable encryption tech stop Anonymous hacker?
Entrepreneurship7 days ago
How to invest in Google AdWords in 2017
Business1 week ago
How will recent Google innovations change the direction of businesses?
Featured1 week ago
Here’s why Warren Buffett does not want $100B in cash
Business1 week ago
Top social media influencers for fashion and beauty brands
Featured1 week ago
3 underground mining facts you probably didn’t know about
Destinations4 days ago
5 best destinations to go to when in Morocco