Connect with us

Trends

Travelling Smart in a Connected World: How Hackers Target Tourists

Published

on

how hackers target tourists while travelling

With the convenience of travelling in the connected world comes new opportunities for cyber criminals to take advantage of unsuspecting travellers. As more people begin to use smart mobile devices and public wi-fi, as well as mobile banking and travel applications while away from home, cybercriminals target unsuspecting travellers using various methods in an attempt to steal their personal (or financial) information, money or digital identity. Therefore, knowing the risks associated with travelling abroad, as well as how to protect yourself, can make the difference between having a smooth trip or experiencing a complete security nightmare. For more news updates, visit our Gulf Independent News page.

Public Wi-Fi Networks: 

As per my original statement, as found in the Introduction section, Public Wi-Fi networks located in airports, hotels, cafes and/or tourist attractions are extremely easy for travellers to access and use; however, those networks are also very popular among cybercriminals. Most public Wi-Fi networks are unsecured, which means any and all traffic sent over these networks is not encrypted; therefore, it is extremely easy for hackers to capture anything sent through that unencrypted network.

What Do Cybercriminals Do? 

Cybercriminals will use “packet sniffing” tools to capture data sent over the unencrypted Public Wi-Fi network. In addition, they will also create fake wi-fi hotspots (i.e., “Free Airport Wi-Fi”) which will look just like legitimate Public Wi-Fi networks (think about how many Starbucks shops or McDonald’s there are around the globe). Additionally, cybercriminals will also be able to intercept user passwords, messages and banking credentials. 

Smart Travel Tip:

Do not ever log in to sensitive accounts (i.e., email, web-based banking) using Public Wi-Fi networks without first using a reliable Virtual Private Network (VPN) to encrypt your Internet traffic before you log into your account.

Phishing and Social Engineering

Cybercriminals may not need access to sophisticated equipment; rather, they rely on human negligence to commit cyber crimes. Tourists everywhere will receive phishing messages through email, text messages (SMS), social networks and messengers. Some common phishing scams directed at tourists include:

  • Emails containing fake flight alerts or links to hotels.
  • Phishing messages containing fake travel deals that capture user login credentials
  • SMS messages indicating failed payments for a tour or hotel, with false requests for entry of bank account information again.

Smart Travel Tip: Take time to verify the sender’s address, and never click on a hyperlink contained in an unknown message. If you suspect a hyperlink may not be legitimate, use the application offered by the airlines/hotels or at least contact them directly.

Hackers may attack via Mobile App and Travel Scam Apps: Tourists frequently download Mobile Applications related to travel, maps, and hotel reservations when they are at their destination. However, many of these applications are fraudulent and contain malware that harvests data or presents advertisements on the device.

How Hackers Target Tourists: Cybercriminals often create and host fraudulent versions of Mobile Applications on 3rd party Application Stores as well as embed track or monitoring devices (spyware) into ‘Free Applications’. The hacker(s) may seek permission to access the user’s phone, contact list or physical location without proper cause.

Smart Travel Tip: Only download applications from official application stores (Google Play, iTunes, etc.) and always check the permissions required for the Application before installing it. QR codes are all around us (within restaurants, on menus, at airports, etc.) QR codes are often altered by hackers to send users to a malicious site.

Some of the ways in which Cybercriminals use QR codes are to redirect users to phishing sites requesting user credentials information as well as for downloading files containing malware to install Tracking Software.

ATM Skimming and Fake Charging Stations

Despite the fact that many people travel with their personal digital devices in hand, and use public WiFi wherever they go, Offline Threats Do Exist! & & Hackers can place skimming devices on ATMs (Automatic Teller Machines) and utilise fake charging stations that will immediately install malware onto your Phone when you plug into it! 

What is a good tip to help Protect Yourself While Travelling?

When using an ATM, always go inside the Bank (as opposed to outside on the Street), and always carry your own charging cable instead of using Public USB Charging Stations.  

For many, travelling to Dubai is thrilling; however, the procedure at the airport, the passage through immigration, as well as airport security may still be a challenge sometimes. Besides the long queues and the tough rules, one can save a lot of time and a great deal of calm by just being well-prepared.

Protecting Your Digital Identity While on the Go

To Ensure You Travel Smart and Stay Secure – (i.e., Travel with Technology) set up 2-Factor Authentication (where applicable) for Any Account that is Considered Important to You), Always Keep Your Software and Security Patches Up to Date, Always Use Strong Unique Passwords with a Password Manager, and Always Backup All Your Important Data Before Traveling.

In today’s world of constant connectivity, travel & technology have become intertwined—(as with Travel and Cyber Risk). With Travel & Cyber Risk, Hackers Target Tourists as they tend to look for Convenience Instead of Security—(especially when travelling when they are Stressed Out, in an Unknown Place, or on a Tight Schedule). The best way to protect Your Data While Travelling is to understand common fraud scams/tactics and to develop Good Digital Hygiene Habits. By practising Good Digital Hygiene habits and knowing the typical scams, you can Enjoy Your Trip to the Max! And have Peace of Mind!

Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Trending