It’s good to be paranoid, and not unwarranted, but think of this, you put yourself at risk fiscal all the time and don’t take any greater precautions. Where does that receipt that you signed at a store go? Who has your PIN number, last 4 digits of your SSN, and your mother’s maiden name?
If you’re worried about the wireless access point, just plug in when you do your banking. No encryption or strong ciphering is 100% unbreakable. No security measures are fool-proof. Do as people suggest, WPA personal at least.
(Not much more to this rant) Keep in mind; it would take somebody actively monitoring your wireless LAN to get your info. How often does this actually happen? Be cautious. You lock your house/apartment, but don’t expect the lock to keep everybody out.
Precautions, not in any order.
1.) Don’t store your keys, passwords, etc in your browser. Use anonymous or private browsing. Turn off keylogers. You’re at great risk of loosing a laptop and having somebody scavenge information off of it. Clean cookies after use, and log off, don't just browse away or close your browser.
2.) Use strong random login names and passwords. I like [UR= http://www3.autistici.org/rpg/]RPG[/URL]. OS X also has one built in, but it’s only for certain applications.
4.) Store your random login names and passwords offline in an encrypted file. A USB key is good. If you’re not very paranoid, keeping it on your disk should be ok.
Password Plus by DataVis works cross multiple platforms, uses industry standard encryption, can import and export encrypted key files, and has limited free trials. One trial is a light version, 10 passwords and numbers, and one is a full version that works for only 30 days. There are other password managers out there. In any case, if you have an iPod, you can store a copy of the software and your encrypted key file to use if your computer crashes. Why store them, it is more likely that a short memorable password will be cracked than somebody get your info from a disk, decrypt it and then get your info. If you can have a random name of 20 characters, and a strong random password of 12 or more characters, then use it.
5.) Reduce your wireless liability. Don’t use wireless if you can, use a good old hard line. Use your home network if you can. Reduce the radius of your local wireless network to the minimum that is needed (that is reducing your transmission power). Use the strongest encryption only for your secure transactions. You can set up your base stations to have multiple configurations. Reducing your encryption load will speed up data transfers, and streams. It also keeps somebody from trying to break weak packets(not really an issue for Apple/Lucent chipsets) and from using brute force to decode packets. In a sense, you’re changing the locks to keep people from practicing picking them. If you’re out and about, use known networks, and use a sniffer like
Kismac or
iStumbler or
MacStumbler. This will let you see if there are other pseudo-spoofed networks that have been created. It will also let you see your signal strength, and find sweet and dead spots at wireless hotspots. Kismac will also let you see what fairly ubickwitous tools can be used if one has more than one wireless card on a computer. (This isn’t to cause fear, just open eyes.) Do not automatically connect to wireless access points. It’s best to choose from a list.
6.) Change passwords regularly. Change PINs semi-frequently. Change keys routeenly.
7.)
Don’t use your mothers madden name. Chose something else, any word will do, but something you will remember.
8.) If given the choice of using your bankcard as a creditcard/checkcard or ATM, always choose credit/check. Why? If your information is compromised on a credit/check card, you can receive a partial or full refund. If your ATM card info and PIN is stolen, you’re screwed! Most banks do not offer any form of refund, and often have ridiculous rules that bourdon you with the proof that you kept your PIN safe. You should do this even at stores. Also try not to use non-major bank ATMs. If it looks shady, don’t use the interface.
9.) Never submit corrections to your information via email prompts, unless you instigated the change!!! If you get an email prompt, ignore it and then contact the 800 number provided on your statement!!!!!
10.) Verify security certificates. If your financial institution has let a security certificate laps, disconnect and call customer support. E-mail a nasty note. If they let you know that they are aware of the problem, they you can proceed. If not, perhaps you weren’t at the proper site. This is unlikely, but it happens.
11.) Inspect the security certificates from time to time. If a bank is using a certificate that is good to lets say 2026, let them know that they suck. Certificates should be renewed periodically, to take into account changes in their system, your system, and to provide better security.
12.) Opt out of “Can our affiliates send you x,,y or z info?” These lists are purchased easily and by anybody. It can be a great way for somebody to attempt to intelligently fish for information.
13.) Erase the free space from time to time on your computer. It’s just good practice.
14.) Check your credit reports. It’s free once a year from the big three.
15.) Use common sense. If you are uncomfortable with something safe, do it the old fashioned way, or at least contact customer support.
Don’t be paranoid. The odds of anybody storing packets you send and receive is very small. The odds are greater that somebody will break into your domicile, car, or pick your pocket. The odds are that a financial institution will internal compromise your information than your information is intercepted at your wireless point. People do spoof wireless locations, but not often. It’s more likely to happen at an airport than a coffee house in the middle of no-where. Keep in mind that there people love to be afraid of things they do not understand. Fear is a good motivator. This said, it’s smart to be aware and practice good security policies.
realityisterror said:
It shouldn't be much of a concern. You should use encryption on your network (ideally WPA rather than WEP) at all times, but even so it's never secure. WEP passcodes can easily be "cracked" if someone is so inclined. WPA can be as well if you use a word as your password.
While it is true that these things can be cracked, easily is not so easy, it takes time, second, as RealityIsTerror notes, you shouldn't really be concerned. Brute force and elegant cracking tools are around, but again, running into somebody that is going to use them against you is not likely.
I like RealityIsTerror's name, it states a truism.
oh, and 3.) Don't use the same passwords and logon names for every site. At minimum, use a similar password and log on name for protected sites, and a common one for low security sites.
What do you think?