Suppose you're sitting at an airport gate, waiting for your flight. You fire up your Windows laptop, see "Free Public Wi-Fi," and attempt to connect to it. After you connect, perhaps you get an automatic private IP address or no IP address at all. You almost certainly don't reach the Internet because you are, in fact, connected directly to some other hapless Wi-Fi user sitting right there at the airport gate.
Before your flight departs, you close your laptop and board your plane. After you deplane at the next city and open your laptop, your Wi-Fi card tries to automatically reconnect to "Free Public Wi-Fi." Others sitting around you see this SSID being advertised by your laptop, and try to connect to you. This cycle repeats itself, spreading "Free Public WiFi" SSID from traveler to traveler, city to city.
AirTight Networks studied this phenomenon by conducting a formal survey of 26 airports throughout the US and Asia. According to published results, these "viral SSIDs" were spotted at 21 airports, infecting approximately 10 percent of the clients observed during surveys.
Just connecting to "Free Public WiFi" is not necessarily harmful. However, your laptop's willingness to connect automatically to strangers exposes you to all sorts of peer-to-peer attacks. To avoid this, configure your Wi-Fi adapter to disallow ad hoc connections and automatic connections to "non-preferred networks." Remove unwanted names from your list of available networks and, in the future, whenever you connect to a new hotspot, reconfigure that available network entry to connect only at your request. These simple steps can help you avoid falling victim to "Free Public WiFi" and other viral SSIDs.
Dig Deeper on Wireless LAN (WLAN)
Related Q&A from Lisa Phifer
As the remote workforce increases, network managers and users might opt to set up two concurrent VPN connections from the same remote device. But ... Continue Reading
Is there a difference between a wireless access point vs. a router? Yes -- while the two wireless devices are related, they meet different needs in a... Continue Reading
Learn the differences between site-to-site VPNs vs. remote-access VPNs and find out about the protocols, benefits and the data security methods used ... Continue Reading