Before you take a vacation, let’s talk about the rules for practicing safe internet on the road.
Somewhere along the Kenya-Tanzania border, 8,000 miles and eight time zones from home, I got the news no traveler wants to hear: My email account had been compromised.
The evidence? One of those English-as-a-second-language messages in which I appeared to beg my friends to wire money overseas. It looked like someone had stolen my password.
Perfect timing, I thought, as my computer strained to download the rest of my emails over a faint wireless connection.
I’ve written about this topic several times and use a long list of precautions, so if it can happen to me, it can happen to anyone.
Kaspersky Lab, a global cyber security company, says one in five travelers have been hit by cyber crime while traveling abroad. In other words, it’s open season on the jet set, particularly those who use open, public wireless networks.
“Never trust open Wi-Fi networks that require no passwords,” says Michael Canavan, a Kaspersky senior vice president.
I reviewed the places where I’d logged into an open network. At the airport in Orlando. In Dubai. At the InterContinental in Nairobi. Impossible to tell where it happened.
What’s wrong with an open network? It may be run by bad guys, according to David Balaban, an expert on ransomware.
“Hackers may set up fake Wi-Fi spots masquerading as a genuine hotel network,” he says. “They create duplicate Wi-Fi networks using the hotel’s branded online materials. They use stronger signals and so lure users to connect to them instead of the genuine hotel network.”
Another common error: hitting the road with obsolete operating systems or software. Emmanuel Schalit, the CEO of the password manager Dashlane, says securing a laptop or cell phone is easy.
“Before you go, make sure your devices are updated with the latest versions of your applications, anti-virus, anti-malware and other software updates,” he says. “To protect your devices while on vacation, secure all of your devices with a lengthy PIN number or strong password, and encrypt any data locally stored on those devices.”
I’d done all of that, too.
Ah, but did I use a Virtual Private Network (VPN), which encrypts your data through a server, to access the Internet? I hadn’t, mostly because a VPN can make a slow internet connection even slower.
“Always use VPN while connected on any public Wi-Fi network,” scolds cyber security expert Sanjay Deo. “This will encrypt your communications and help reduce chances of being hacked.”
In all fairness, once I spotted the apparent hack, I immediately fired up my Buffered.com VPN and used it for the rest of my time in Africa. A slow connection is better than a dangerous one.
Anything else? Yes, says Internet safety expert Darren Guccione. I need to set my smartphone so it self-erases after multiple incorrect logins. I need to activate anti-theft applications such as “find my phone” that allow you to lock the phone if it’s stolen. “So if your phone or tablet is stolen, you can track it, disable it and change all the passwords,” he says.
What else? Had I somehow typed my password on a public computer? No. Had I inadvertently revealed my password to a hacker while on a stopover or in a hotel lobby? Also, no. How about responding to a suspicious email that appeared to be from my bank, a classic phishing attempt? Absolutely not.
So what happened? I received about six emails in total from concerned friends, all with the same message: Send money now. That’s only a tiny fraction of the 10,000-plus contacts in my address book.
A closer look at the signature showed the messages didn’t come from me but were spoofed. That means someone manipulated the email signature to make it look like it came from my address. The six people who received the message were all fellow consumer advocates whose email addresses had apparently been harvested from my website.
This was no computer security breach at the hands of a careless traveler. It was a lesson in being discreet about your travel plans. I’d told a lot of people about my plans to visit Kenya, and one of them decided it would be the perfect time to scam my co-workers.
Do you want to scam a consumer advocate? Good luck with that.
What not to do when you travel:
Post lots of geotagged photos or location updates on social media
They can reveal your current and future travel plans in sufficient detail to give criminals an opening. The latest threat: virtual kidnappings, which are becoming more common in Latin America. When you go camping, into the wilderness or to locations where you may be off the grid, cyber stalkers contact your family, claiming you are their hostage. “They will demand immediately a sum of money, usually affordable and easily wired, and insist that the person stay on the phone, using fear tactics but always aimed at ensuring that their ruse is not discovered,” says Mark Deane, CEO of ETS Risk Management.
Only use HTTPS — Hypertext Transfer Protocol (http) with Secure Sockets Layer (SSL) — when you’re online, especially when you’re on the road. “It’s a more secure option set up by a website that knows security is essential,” says Robert Siciliano CEO of IDTheftSecurity.com. Look for https:// in the address bar, signifying it’s a secure page. Even on an open, unsecured wireless connection, HTTPS is more secure.
Leave your device unattended
“The biggest danger travelers have is losing their devices,” says Jason Hong, a professor at Carnegie Mellon’s School of Computer Science. “Don’t leave your devices unattended in public places, because they can be quickly and easily stolen.” Pro tip: Put your name on your device, in case someone returns it to lost and found. Hong tapes his business card to the bottom of his laptop.
DISCLAIMER: This article expresses my own ideas and opinions. Any information I have shared are from sources that I believe to be reliable and accurate. I did not receive any financial compensation in writing this post, nor do I own any shares in any company I’ve mentioned. I encourage any reader to do their own diligent research first before making any investment decisions.
Why consumers should care about the launch of 5G
5G has started to roll out, but many consumers are not excited about it given the poor and unreliable cellular...
Self-Directed IRA LLC: How to know it’s right for you
You can use a Self-Directed IRA LLC to diversify your retirement portfolio, especially when you want to invest in assets...
GlaxoSmithKline to acquire Tesaro to strengthen pharmaceuticals business
GlaxoSmithKline is beefing up its pharmaceuticals business with the acquisition of Tesaro for its strength in cancer treatment drugs, and...
How to make the best out of email marketing
A traditional email can do wonders for companies, but they must understand how to make it more effective.
Nationwide toll transponder system could materialize in the next 3 years
Toll operators were supposed to make their systems compatible by 2016 but that didn't happen, affecting travelers, especially car rental...
Collections5 days ago
Snyder art gallery in Texas showcases creativity at its smallest
Featured5 days ago
Joe Liemandt: From ‘tech bad boy’ and revolutionary to industry icon
Featured3 days ago
Cannabis companies look towards global production as North American pot stocks suffer heavy losses
Crypto3 days ago
Kaleido’s Blockchain-as-a-Service offers enterprise subscriptions
Base Metals4 days ago
Going beyond gold: Companies eye Nevada as base metals center
Crypto3 days ago
Is Bitcoin entering a mining death spiral?
Crypto4 days ago
G20 leaders agree to regulate crypto-assets but no mention of taxation
Entrepreneurship2 days ago
Why website owners should have good page loading speed