[Answer] How can you protect your information when using wireless technology?

Answer: Avoid using non-Bluetooth-paired or unencrypted wireless computer peripherals.
How can you protect your information when using wireless technology?

Wireless identity theft also known as contactless identity theft or RFID identity theft is a form of identity theft described as “the act of compromising an individual’s personal identifying information using wireless (radio frequency) mechanics.” Numerous articles have been written about wireless identity theft and broadcast television has produced several investigations of this phenomenon.

Encryption of traffic to the wireless and wired network using protocols for 802.1X such as EAP-TLS EAP-PEAP or EAP-MSCHAP. Role-based controls of user device application or security posture post authentication. Automation with other tools to define network role based on other information such as known vulnerabilities jailbreak status etc.

Users can protect themselves by updating virus protection using security settings downloading patches installing a firewall screening email shutting down spyware controlling cookies using encryption fending off browser hijackers and blocking pop-ups . However most people have little idea how to go about doing these things.

Internet privacy – Wikipedia

Cellphone surveillance – Wikipedia

Wireless identity theft – Wikipedia

Internet privacy – Wikipedia

Radio jamming is the deliberate jamming blocking or interference with wireless communications.. In some cases jammers work by the transmission of radio signals that disrupt communications by decreasing the signal-to-noise ratio.. The concept can be used in wireless data networks to disrupt information flow. It is a common form of censorship in totalitarian countries in order to prevent …

Mass cellphone surveillance Stingray devices. StingRay devices are a technology that mimics a cellphone tower causing nearby cellph…

Leave a Reply