Are you going to the 2018 World Cup to Russia? Watch out for seemingly secured Wi-Fi networks in these cities

According to Kaspersky Lab research, 7176 out of around 32,000 public Wi-Fi networks in cities hosting the 2018 World Cup in football do not use traffic encryption. Thus, the use of them by fans visiting these cities is potentially dangerous. The results of the survey show that the fans should take care of their personal data (eg by installing a VPN), especially when using open Wi-Fi connections in places where matches are held.

The results are based on the analysis of public access points in 11 cities: Saransk, Samara, Nizhny Novgorod, Kazan, Volgograd, Moscow, Yekaterinburg, Sochi, Rostov, Kaliningrad and Saint Petersburg.

Not all wireless access points have encryption and authentication algorithms - aspects that are necessary to maintain Wi-Fi network security. This means that potential attackers only have to be near the access point to capture network traffic and gain confidential information from uninformed or unprepared users.

Dangerous Wi-Fi - install the recommended VPN

The cities with the highest percentage of uncertain Wi-Fi networks are Saint Petersburg (37%), Kaliningrad (35%) and Rostów (32%). In turn, the safest cities turned out to be relatively small towns - Saransk (only 10% of Wi-Fi points are open) and Samara (17% of Wi-Fi points).

Kaspersky Lab's detailed report on the situation regarding Wi-Fi networks in the cities hosting the FIFA 2018 World Cup is available on this website .

WPA2 theoretically safe. Install any VPN.

Nearly two-thirds of all public Wi-Fi networks in these locations encrypt traffic using WPA / WPA2 family protocols, which are considered one of the safest, but do not forget about the vulnerability of KRACK , which any VPN protects against.

Which VPN server provider should you choose?

VPNs are divided into those in the browser and in the operating system. We recommend installing the VPN client in the system, because all network traffic is encrypted then. An extension installed in the browser (or integrated with a browser, eg OperaVPN) will only encrypt traffic passing through the HTTP / S protocol on ports 80, 8080 and 443 - and depending on the VPN provider - the connection will use VPN's DNS servers or external provider who will find out which websites the user is visiting. This is another trap lurking on the imprudent who would like to hide from the world. VPNs were not created for privacy, but to increase security.

If we were to recommend a supplier, then NordVPN is probably the best choice . In the most favorable 2-year plan, NordVPN offers more than 4,000 output servers from 62 countries around the world. So there is a lot to choose from. For those who would like to take advantage of the NordVPN offer, we recommend our affiliate link , which will give you a small percentage after each purchase.

NordVPN client applications are available for almost all operating systems: Windows, macOS, iOS, Apple, Linux and many more. NordVPN supports the P2P protocol (not all VPNs do), so you can download whatever you like and feel secure without any problems. In addition, NordVPN uses its own DNS server, so no other DNS communication node will log websites visited. And most importantly, the company NordVPN is registered in Panama and does not store any logs - there is no such obligation.

VPN protects the device owner from imprudence or imprudence when logging in to Internet services. Secures, among others against the vulnerability of KRACK on Wi-Fi and allow to avoid restrictions on services or websites imposed by government dictatorships ( which will be especially useful in Russia ).



Add new comment

The content of this field is kept private and will not be shown publicly.

Learn more about our offer

If you sell security solutions, are a distributor, authorized partner or developer and would like to share your portfolio with a group of potential customers, advertise an event, software, hardware or other services on AVLab - simply write to us. Or maybe you had to deal with ransomware? We can also help you decrypt your files.
Read more

We use Google Cloud Translation and Gengo API’s to translate articles with exception of our comparative tests.