logo
This Is One of the Biggest Cybersecurity Mistakes You Can Make at an Airport, Experts Warn

This Is One of the Biggest Cybersecurity Mistakes You Can Make at an Airport, Experts Warn

While cruising an airport's public internet network may feel like a convenience, criminals can easily exploit those networks to steal sensitive data from unsuspecting travelers, experts warn.
'It's definitely among the worst things you can do at an airport,' Matthew Hicks, a cybersecurity expert and associate professor of computer science at Virginia Tech, told Travel + Leisure .
Public Wi-Fi is a shared internet connection, often over an unsecured network. Users are therefore vulnerable to hackers, who can intercept data like credit card details or account passwords, and install malware onto consumers' devices, according to experts.
About 40 percent of Americans have had their data compromised while using a public Wi-Fi network, according to a recent Forbes Advisor survey of 2,000 workers who regularly use public internet. Yet, 23 percent of users said they think public Wi-Fi is completely safe, and another 43 percent said it's somewhat safe, the Forbes survey found.
Anything you do on airport Wi-Fi should be something you'd be comfortable with the rest of the world knowing about.
— John Breyault
Because travelers often have ample downtime before flights—and may be in an area without cellular connection—airports are a common access point for public Wi-Fi, Hicks said.
Consumers reported losing more than $16 billion to internet crime overall in 2024, a record high and a 33 percent increase from 2023, according to data from the Federal Bureau of Investigation.
Personal data breaches were among the top three most common complaints received by the FBI, it said. 'As nearly all aspects of our lives have become digitally connected, the attack surface for cyber actors has grown exponentially,' B. Chad Yarbrough, operations director for the FBI's criminal and cyber unit, wrote in the Bureau's annual internet crime report. 'Scammers are increasingly using the Internet to steal Americans' hard-earned savings.'
Scammers also often try to trick travelers into logging onto fake Wi-Fi networks, John Breyault, vice president of public policy, telecommunications and fraud at the National Consumers League, a consumer advocacy group, told T+L.
Someone trying to connect to the O'Hare Guest Wi-Fi network may unknowingly access another—perhaps 'O'Hare Guest 2' or 'Chicago Airport Wi-Fi'—controlled by a criminal. "Make sure [the network] is the one run by the airport, and not someone setting up a honeypot," Breyault said.
In 2024, the Australian Federal Police charged a man for allegedly establishing one of these so-called 'evil twin' networks to steal people's personal data. He did this at airports in Perth, Melbourne and Adelaide, among other places, AFP reported.
Accessing the correct network will 'eliminate most of the real attackers,' Hicks said, adding that travelers can ask airport personnel if they're unsure.
Using your cell phone to establish a personal internet hotspot is among the safest ways to access the web in an airport. This simple step will reduce the number of attackers to 'near zero,' according to Hicks. That's because it's a private cellular connection instead of an open Wi-Fi network. 'You're not sharing that connection with everyone else in the airport,' Breyault said. 'Your data will be much safer in transit.'
If that's not available, experts recommend using a device with a 'virtual private network' or VPN, which is an encrypted connection that offers an additional layer of security. Hicks' best advice is to buy one from a reputable, U.S.-based company.
Travelers should ultimately avoid logging into financial, email, social media, or other sensitive accounts over airport Wi-Fi, Breyault noted. 'If you're just checking the weather, that's one thing,' Breyault said. 'If you're checking your bank account balance, that's something different.'
"Anything you do on airport Wi-Fi should be something you'd be comfortable with the rest of the world knowing about,' he said.
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

How CISOs Can Break Through Communication Barriers
How CISOs Can Break Through Communication Barriers

Forbes

time2 hours ago

  • Forbes

How CISOs Can Break Through Communication Barriers

Tech leadership is becoming more important—and understood—by companies and their boards. According to a survey from Deloitte this summer, half of tech professionals have four or more C-suite tech positions in their organizations—including CIO, CTO, CISO and CDAO (data and analytics). There tend to be more tech-specific C-suite roles than in any other single area of the company, but more executives don't automatically make the massive job of governing, regulating, upgrading, protecting and innovating with tech and data any easier. A quarter of respondents said they have a tough time keeping clearly defined responsibilities straight. Top priorities for the coming year also don't necessarily fit in any one executive's purview. About 36% ranked security as a top priority, which is often seen as the CISO's responsibility. But the other top priorities—reducing operational or product costs and increasing value, expanding into new markets or segments, and attracting and engaging customers—straddle many positions. And of course, many companies are working toward an AI transition. Not only do AI functions cross into many different tech areas (especially because many companies might not have a chief AI officer), but the skills for AI are lacking. About 45% say the inability to get people with the right skills is the biggest obstacle to bringing in AI—something that seven in 10 say is likely to add to the company's tech headcount. This is an unconventional barricade for tech leaders. The leadership positions are there, but duties are unclear, priorities are all over the map, and talent for improvement is lacking. It's time for companies and tech leaders to work more on their roles internally. Delineate exact policies and responsibilities for different executives, and decide what structure workis best for company needs. Work on upskilling existing employees. And keep an eye to what skills and capabilities are needed for the long term. While cybersecurity is traditionally the domain of the CISO, the nature of attacks and vulnerabilities today means that everyone needs to have some understanding and responsibility for it. But it can be tough to bridge the communication gap between technical CISOs and other employees. Sameer Ansari, global security and privacy lead at consulting firm Protiviti, gave me some strategies to do that well. An excerpt from our conversation is later in this newsletter. This is the published version of Forbes' CIO newsletter, which offers the latest news for chief innovation officers and other technology-focused leaders. Click here to get it delivered to your inbox every Thursday. POLICY + REGULATIONS President Donald Trump delivers remarks on AI at the All-In and Hill & Valley Forum "Winning The AI Race" on Hill & Valley Forum President Donald Trump unveiled his AI policy plan on Wednesday. The overarching goal is to solidify the U.S. position as the world leader in AI—through policies that encourage technology and infrastructure development in the U.S., as well as promoting other nations to buy American AI technology. 'America is the country that started the AI race. And as president of the United States, I'm here today to declare that America is going to win it,' Trump said at a Wednesday evening event in Washington, D.C. 'We're going to work hard, we're going to win it because we will not allow any foreign nation to beat us.' The particulars of the new policy and its parameters—or lack thereof—are not surprising, given Trump's well-known disdain for regulation. At the beginning of his plan: 'Remove red tape and onerous regulation.' The technology, the plan says, is 'far too important to smother in bureaucracy at this early stage, whether at the state or federal level.' The plan doesn't say what kind of AI use might be considered out of line—there are no mentions of protecting secure infrastructure systems, privacy or copyrights. But it directs the NIST AI Risk Management Framework, which helps organizations to minimize risks when implementing AI, to eliminate references to misinformation, DEI and climate change. In his remarks, Trump did speak out against copyright protections for content used to train AI models. 'You can't be expected to have a successful AI program when every single article, book, or anything else that you've read or studied, you're supposed to pay for,' he said. This issue is one of the biggest pending legal matters today around AI. Many publishers, including Forbes , have sued AI companies, accusing them of copyright infringement for unauthorized use of content. Two AI industry leaders—Nvidia CEO Jensen Huang and AMD CEO Lisa Su—attended Wednesday's event and praised Trump's plan, the Wall Street Journal reported. 'For the U.S. to lead in AI, we have to run fast, and the AI action plan is a great way of just laying out all the various pieces that will be helpful for us to run fast,' Su told the Journal . NOTABLE EARNINGS Google headquarters in Mountain View, parent Alphabet reported yet another successful quarter, with $96.4 billion in revenue—a 14% year-over-year increase—surpassing analysts' forecasts of $94 billion. The largest percentage of growth came from the Google Cloud division, with revenues reaching $13.6 billion. But the services sector—which includes Google Search, ads on YouTube and other platforms, and subscriptions—saw $82.5 billion in revenue. 'This is all possible because of the long-term investments we have made in our differentiated full-stack approach to AI,' CEO Sundar Pichai said on the earnings call. 'This spans AI infrastructure, world-class research, models and tooling, and our products and platforms that bring AI to people all over the world.' Pichai said the company is increasing its investment in AI infrastructure this year by $10 billion, bringing the total to $85 billion. The dollars going toward infrastructure is planning ahead, he said, working to meet future demand trends. But analysts are tempering Alphabet's success both in the present and future with the outcome of a pending court ruling. The company was found to have held an illegal monopoly in search, and a federal judge is expected to issue a ruling on how to remedy the situation next month. The government has asked the court to force Google to sell its Chrome browser and share its search results data—two actions that could have deep consequences for the company's revenues going forward. CYBERSECURITY getty Hackers breached Microsoft SharePoint on-premise server systems last weekend, accessing data and internal code for an estimated 400 organizations, Reuters reported. The vulnerability was discovered in the attack, and Microsoft quickly issued a security patch, writes Forbes senior contributor Davey Winder. However, the patch doesn't cover all versions of the software that was breached, and the damage may have already been done; cryptographic keys stolen in the breach could allow hackers to retain access without a reset. Major victims of this breach include government, hospital and educational institutions that have security reasons for keeping more data on-premises. According to reports, victims include agencies of the Department of Homeland Security, National Institutes of Health and National Nuclear Security Administration. Microsoft said that Chinese nation-state actors Linen Typhoon and Violet Typhoon, as well as Chinese threat actor Storm-2603 have historically exploited these SharePoint vulnerabilities. BITS + BYTES How To Break Down Barriers Between The CISO And The Rest Of The Company Protiviti global security and privacy lead Sameer Ansari. Protiviti Cybersecurity is, to some extent, everyone's responsibility. It means the CISO needs to be able to communicate with other executives and employees who may not have the same technical expertise. I talked with Sameer Ansari, global security and privacy lead at consulting firm Protiviti, about how CISOs can make themselves a part of the company's strategic discussion, and be seen as more than a blocker who says new plans are too dangerous. This conversation has been edited for length, clarity and continuity. How does a CISO enter into a partnership with the rest of the company and come to a common understanding of both what they need and what the rest of the company's trying to do? Ansari: It's changing the typical approach that some CISOs have. We're getting out of the technical conversation and putting that to the side, and really focusing on what the business-oriented goals are. A lot of times, the business will come to the CISO with an idea that they want to do from a new product or new region perspective. It's up to the CISO to understand what they're trying to accomplish. If there are some risks associated with that, use that as an opportunity to educate the business on what those risks are, and not just say no: 'Hey, I hear what you're trying to do, but these are some of the risks I'm seeing. Let me explain to you why these are risks.' Use it like an education opportunity, and then start to work with them on joint solutioning. Sometimes, the business will be like, 'That's a security issue. You go deal with it.' And [you need to] show them that, 'Hey, me making a decision on my own in a silo is not good for you, just like you making a security decision on your own without having that conversation with me is not good for either of us.' You should make sure that you can actually have that joint conversation. You should also be solution oriented. If there is a risk there that you think the business is taking that's too large, thinking about saying, 'Here's some alternatives,' and seeing if they're open to those alternatives. How can a CISO get from talking in an overly technical way to explaining threats in a way that everybody can understand? It's through storytelling, using examples and actually giving things that are a little bit more concrete in terms of why things matter, focusing on what I like to call the 'so what.' You have a technical vulnerability. What's the impact of that? How does that translate to what the business is trying to do? Both parties need to put themselves in each other's shoes as much as they can. CISOs will never understand the business as well as the business understands the business, and the business will never understand cybersecurity as well as the CISO does. But spending time and collaborating and having those honest conversations about what each of you're trying to accomplish and how can they actually make those intersect. A good example would be expanding into China or selling a part of the business. Having the CISO early in that conversation and saying, 'Hey, if we want to divest from this business or go into a new market, what should we be thinking about? How do we actually approach this?' [They should collaborate] with legal, thinking about the cybersecurity compliance issues, what new threat factors do we need to think about, and what's the cost associated with that? A lot of times when the business has an idea, they're thinking about the ROI, but the cost of cybersecurity a lot of times does not get factored into that. What advice would you give to a CISO who is hoping to be more collaborative and proactive with other executives and the board of their company? We still see business as very relationship-oriented, so I think you should be having to invest in the relationships outside of your IT or CISO teams and spending time with the business—getting to know them, getting to know what their priorities and key strategies are. That'll make the CISO much more informed in terms of what their strategy should be. Also, when they go to the board to talk about what's happening within their organization from a cybersecurity perspective, [you'll know] how to present it in a way that the board will actually understand and care about certain things. COMINGS + GOINGS Cybersecurity solutions provider Check Point Software Technologies appointed Jonathan Zanger as chief technology officer. Zanger most recently worked in the same role at Trigo. appointed as chief technology officer. Zanger most recently worked in the same role at Trigo. Healthcare staffing company CHG Healthcare welcomed Theresa O'Leary as chief information officer. O'Leary joins the company from UPS, where she was vice president of technology, and she succeeds Scott Boecker, who is moving to another role. welcomed as chief information officer. O'Leary joins the company from UPS, where she was vice president of technology, and she succeeds Scott Boecker, who is moving to another role. Online learning platform Coursera tapped Grant Parsamyan to be its new chief data officer, effective July 21. Parsamyan previously worked as chief data & information officer at Alludo, and has also held leadership roles at OpenTable, eHarmony and Yahoo. STRATEGIES + ADVICE It doesn't matter how much time and money your company invests in cybersecurity threat management. The biggest threat is different departments working in silos. Here's why that's a problem, and how to break down those barriers. Many tech companies are adding AI agents to their software, but customers are slow to start using them. The reasons are many. They're new ideas, but they can also do unintended actions. Here's how to manage new AI agents so that they earn your company's trust and do what they're meant to. QUIZ An upcoming film titled Artificial is reportedly in development at Amazon MGM Studios. What real-life situation is it said to be about? A. The race for tech companies to develop applications and tools for home VR use B. The firing and rehiring of OpenAI cofounder and CEO Sam Altman C. Nvidia's rise from a gaming component manufacturer to the world's most valuable company D. The race to develop AI chatbots, focused on the rivalry between OpenAI cofounders Altman and Elon Musk See if you got the answer right here.

iOS 26 Public Beta Is Here: Download Apple's Liquid Glass Update Today
iOS 26 Public Beta Is Here: Download Apple's Liquid Glass Update Today

CNET

time2 hours ago

  • CNET

iOS 26 Public Beta Is Here: Download Apple's Liquid Glass Update Today

If you've been itching to poke around Apple's next big iPhone update, today's your day. Apple just opened the first iOS 26 public beta (July 23) to anyone in its free Beta Software Program, letting everyday users try the new OS months before it ships alongside the iPhone 17 this fall. The public beta follows six weeks of dev-only releases, capped yesterday with developer beta 4. iOS 26 is Apple's most ambitious revamp in years. The entire interface now shimmers with Liquid Glass, a translucent layer that morphs as you scroll, and an updated Apple Intelligence powers live call translation and a souped-up Visual Intelligence search. You'll also see other perks like call screening and personalized text message chats. Before you download, double-check your hardware: iOS 26 needs at least an A13 Bionic chip, so only the iPhone 11 model and newer qualify. Apple Intelligence features stay exclusive to the iPhone 16 line and iPhone 15 Pro and Pro Max. Also remember that it's still beta software. Expect bugs, battery dips and the occasional app crash. You should definitely back up your phone first (better yet, create an archive on your computer), consider installing on a spare device and keep your computer nearby in case you need to roll back to iOS 18. If that sounds good, here's how to install the iOS 26 public beta. Don't miss: Revert Back to iOS 18 From iOS 26 Beta: The No-Stress, Step-by-Step Guide How to download the iOS 26 public beta on your iPhone As long as you know the risks and have backed up your phone, you can download the iOS 26 public beta. Here's what you need to do: 1. Enroll in Apple's Beta Software Program On the iPhone you want to update, open Safari and visit Sign in with your Apple ID. If you're new to the program, tap Sign Up and follow the prompts to accept Apple's beta agreement. 2. Sign up for the iOS 26 public beta After signing in, choose iOS at the top of the page. You'll land on a dashboard with details about the iOS 26 public beta. Under Get Started, tap Enroll your iOS device. Because Apple now handles betas directly in Settings (no more configuration profiles), all you need to do is link your Apple ID and you're good to go. 3. Enable beta updates On your iPhone, go to Settings > General > Software Update > Beta Updates. Choose iOS 26 Public Beta from the list. 4. Download and install iOS 26 beta Now, return to Settings > General > Software Update. The iOS 26 public beta should appear. Tap Download and Install and follow the on-screen instructions. Keep your phone on Wi-Fi and plugged in during the update. Once your iPhone reboots, you'll be running the latest iOS 26 public beta—complete with the new Liquid Glass interface and (if your hardware supports it) Apple Intelligence features.

The First iOS 26 Public Beta Is Here, But Think Twice About Installing It Now
The First iOS 26 Public Beta Is Here, But Think Twice About Installing It Now

CNET

time2 hours ago

  • CNET

The First iOS 26 Public Beta Is Here, But Think Twice About Installing It Now

Now that the iOS 26 public beta is now available, you may be itching to install it on your iPhone and start to experience the new Liquid Glass interface, live translation and other features coming in the fall. But I'm going to be the annoying voice of reason for a moment and encourage you to hold off for now -- or at least make sure you're loading it on a test device. The "beta" in "public beta" is there for a reason. Prerelease software is unfinished, and even though a public beta means Apple is confident enough to seed it on several thousand iPhones, the goal is to see how the update fares before it's deployed on millions of iPhones. Although the iOS 26 developer beta has been pretty stable, one never knows what bugs could slip through. For more on what iOS 26 brings to the iPhone, make sure you check out everything Apple announced at WWDC 2025. I'm Impressed With iOS 26. Apple Just Made iPhones Better I'm Impressed With iOS 26. Apple Just Made iPhones Better Click to unmute Video Player is loading. Play Video Play Skip Backward Skip Forward Next playlist item Unmute Current Time 0:00 / Duration 5:40 Loaded : 10.49% 0:00 Stream Type LIVE Seek to live, currently behind live LIVE Remaining Time - 5:40 Share Fullscreen This is a modal window. Beginning of dialog window. Escape will cancel and close the window. Text Color White Black Red Green Blue Yellow Magenta Cyan Opacity Opaque Semi-Transparent Text Background Color Black White Red Green Blue Yellow Magenta Cyan Opacity Opaque Semi-Transparent Transparent Caption Area Background Color Black White Red Green Blue Yellow Magenta Cyan Opacity Transparent Semi-Transparent Opaque Font Size 50% 75% 100% 125% 150% 175% 200% 300% 400% Text Edge Style None Raised Depressed Uniform Drop shadow Font Family Proportional Sans-Serif Monospace Sans-Serif Proportional Serif Monospace Serif Casual Script Small Caps Reset Done Close Modal Dialog End of dialog window. Close Modal Dialog This is a modal window. This modal can be closed by pressing the Escape key or activating the close button. Close Modal Dialog This is a modal window. This modal can be closed by pressing the Escape key or activating the close button. I'm Impressed With iOS 26. Apple Just Made iPhones Better A positive word about installing the iOS 26 public beta The public beta is more stable than the developer betas, which are intended for developers who need to skirt the edges of stability to test their products. But "more stable" isn't the same as "rock solid." Apple is still adding and changing features in the iOS 26 betas before the anticipated release of iOS 26 in September or October. If you decide to install the iOS 26 public beta, I recommend doing it on a separate iPhone that isn't used as your main personal phone. iOS 26 will work with models as old as the iPhone 11, so reach into the back of your tech drawer and put that forgotten iPhone into service. Also, as always, make sure you have good backups of your data. Bugs are part of the iOS 26 public beta Now, let's discuss why upgrading to the iOS public beta might be a bad idea. Software bugs at the development stage are to be expected -- in fact, that's kinda the point. Now is the time for bugs to skitter into the light so developers can catch them and Apple can fix them before the final release. Opening the public beta to more testers helps flush out odd interactions with a much larger pool of iPhones and third-party apps. Bugs can vary across the spectrum. You could face connectivity issues with Bluetooth or Wi-Fi, or end up with third-party applications crashing from time to time. And runaway background processes could keep the system running hotter than normal, decreasing not just how long the phone operates on a battery charge, but potentially stressing the battery's lifespan. To be fair, I've never dealt with any show-stopping, brick-your-phone bugs in a beta -- usually, they're a series of annoyances that can grate on you after a while. But all of this is perfectly normal in developer and public betas. But if you don't want to deal with bugs and other issues that could make your phone more difficult to use, you probably don't want the iOS 26 public beta on your primary iPhone. Your battery life may worsen Did you recently buy a recommended portable charger for your iPhone? Expect to make more use of it while running beta software. Energy efficiency is usually the last thing Apple's developers optimize, because the priority at this point is to make sure features work and bugs are stamped out. An iOS update also triggers a host of internal indexing, which consumes a lot of energy for a few hours or days after installation. The Photos app, for example, updates its database of recognized people, scans images for new recognizable objects or scenes for search purposes and looks for duplicates. Betas can be tough on batteries. CNET Performance may take a hit Partially because of the reindexing of gigabytes of data on your phone, the iOS 26 public beta will almost certainly not deliver the performance you might be expecting. Processor-intensive apps and games also need to be tuned to work with the new iOS, so stutters and glitches are normal. Game Mode can improve performance in demanding games but beta software could interrupt such low-level processes. Jeff Carlson/CNET I know it's tough to be patient when future features are just a download away. But I also don't want you to be burned (as I have in the past). For more about iOS 26, see how the new Liquid Glass interface compares to iOS 18.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store