Bad guys listening in? Take steps to avoid public Wi-Fi snooping

If you're concerned about an intruder taking an unfair share of your data, turn off sharing.

If you're concerned about an intruder taking an unfair share of your data, turn off sharing.

Reader H. Thomas Staton would like his laptop to be as secure as possible while he's on the road. He writes:

What is the best way to secure my MacBook Pro from hackers when I'm logged into public Wi-Fi?

There are a few measures you can take. Let's start with over-sharing.

By this I mean that if you don't want to provide people access to your Mac, you should shut any doors that provide it. To start, go to System Preferences > Sharing and turn off any sharing options you have enabled--file sharing and screen sharing, for example.

Although it doesn't provide a way into all of your stuff, you may also wish to turn off iTunes sharing. On more than one occasion I've logged onto a hotel network, fired up iTunes, and found a load of shared iTunes libraries--some identified by the user's name. This can be particularly embarrassing when you know that person and their library is full of 70s disco albums. (That kind of insight, no one needs.) To switch off sharing, open iTunes' preferences, click the Sharing tab, and uncheck Share My Library On My Local Network.

Of course if you're really concerned, you could also turn off Wi-Fi altogether when you're not using it, which would certainly bar any attempts at your stuff when you're not watching your computer.

That's all well and good in regard to keeping out intruders, but what about the data you're sending over the network? If you're looking for that kind of protection, consider paying for a VPN (Virtual Private Network) account. Log into a VPN and your data is encrypted as it passes through a secure tunnel, thus keeping the good stuff out of the bad guy's clutches. If you're interested in learning more, see Glenn Fleishman's How to surf safely with a VPN-for-hire.

Or you could forego this Wi-Fi connection entirely and instead use another hotspot. Your iPhone could be just the thing if you've paid for a tethering plan. Yosemite's Instant Hotspot feature makes this really easy. Your iPhone will appear under the Mac's Wi-Fi menu if the phone's running iOS 8 and you have a tethering plan. Just choose it and you're good to go.

And then there's the old-fashioned way. Purchase a MiFi device from just about any mobile carrier along with a data plan to feed it and you have a hotspot in your pocket.

Join the CSO newsletter!

Error: Please check your email address.

Tags Applesecurity

More about

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Christopher Breen

Latest Videos

  • 150x50

    CSO Webinar: Will your data protection strategy be enough when disaster strikes?

    Speakers: - Paul O’Connor, Engagement leader - Performance Audit Group, Victorian Auditor-General’s Office (VAGO) - Nigel Phair, Managing Director, Centre for Internet Safety - Joshua Stenhouse, Technical Evangelist, Zerto - Anthony Caruana, CSO MC & Moderator

    Play Video

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

More videos

Blog Posts

Market Place