top of page

ENCRYGMA Encrypted Phone: "iPhone Cyber Threats: Beware of Your Wi-Fi Setting "

Writer's picture: The DigitalBank Vault The DigitalBank Vault

Updated: Jul 6, 2021



There are plenty of cyber threats targeting your iPhone—phishing attacks linking to malicious websites, targeted emails ferrying high-risk attachments, even texts crafted to crash your device. Apple does a great job of locking down its hardware and software. But there’s not much Apple can do if you don’t take basic precautions for yourself. And that’s definitely the case with one Wi-Fi feature you need to disable on your device.


By now, we should all be well aware of the perils of public Wi-Fi—airports, shopping malls, coffee shops, stores, and hotels. Convenient and usually free, saving our data plans and ensuring we can use our phones normally when away from home. But if you do connect your iPhone to the hotel, coffee shop, airport, or restaurant Wi-Fi, you’re likely making the risks much, much worse than they need be.


Yet again this month, the FBI has warned users to beware of the risks of public Wi-Fi as Americans increasingly work away from offices and often homes. The FBI highlighted hotels now advertising distraction-free environments for those working from home. “Criminals can conduct an ‘evil twin attack’ by creating their own malicious network with a similar name to the hotel’s network. Guests may then mistakenly connect to the criminal’s network instead of the hotel’s.” But attacks can be much simpler than this.


When you connect to public Wi-Fi, you rely on the network’s service set identifier, its SSID, to pick a connection. This is often the name of the hotel, coffee shop or bar, it’s intended to keep things simple. Your iPhone will then automatically connect to that Wi-Fi, again and again, each time you return to the location, intended as a convenience. But that simple convenience is a significant security risk that you must address.


“Most devices are configured to automatically connect to known hotspots,” security researcher Sean Wright warns. “Victims don’t need to do anything to connect. They just need to be in range. There are enterprise Wi-Fi solutions that use certificates to help provide authenticity, but I’ve not seen any of these hotspots use those.”


This security risk is so stark that it can be pushed to satirical levels. “Public Wi-fi will always have risk,” Cyjax CISO Ian Thornton-Trump says. “I once saw a Starbucks and a Subway Wi-Fi access point, flying from Newark to Vegas at 35,000 feet.”


“I’d avoid auto-joining any public network,” Wright says. “You never know who is behind it. Also, since they are public and open, it makes spoofing them all too easy.” What he means is that an attacker can set up their own Wi-Fi hotspot with that same SSID—it’s as easy as that. And your phone will happily connect when in range if you have connected to the legitimate network with that SSID before.


Worse, your iPhone is constantly searching for familiar Wi-Fi networks, “sending out probes for hotspots it is looking to connect to,” Wright says, “so [an attacker] can stand-up hotspots with those SSIDs—a capability built into Wi-Fi Pineapples,” malicious routers designed to intercept traffic. But, in reality, no special equipment is needed. It takes nothing more than a cell phone. “I was in a hotel lobby,” Wright says, “I set up my ‘free’ hotspot and had five devices connect in a matter of minutes.”


“With more remote working than ever,” ESET’s Jake Moore says, “it may be tempting for a change of scenery to use a coffee shop. But its free Wi-Fi might not always be what you expect. Many people forget that public Wi-Fi can be dangerous and become complacent when it comes to connecting without a thought about the security risks.”


And if we use these public Wi-Fi networks while working away from offices under coronavirus restrictions, then we risk compromising our employers’ networks and data, not just our own. “Connecting personal or business devices to a hotel’s wireless network,” says the FBI, “may allow malicious actors to compromise the individual’s device and then access the business network of the guest’s employer.”


“Although rare,” Moore says, “it is possible to extract information from a device if a threat actor is controlling the Wi-Fi that the target is connected to.” Moore advises users to stick to cellular connections. But that’s not always realistic when working. “A VPN can help if you are in desperate need to use an unknown hotspot,” he says.


This call to use a VPN if you must use hotspots is echoed by Nicola Whiting, Chief Strategy Officer at Titania. "If you connect it, protect it. If you're willing to spend $10 or more eating and drinking out, and you know you're going to use public Wi-Fi—even though it's a risk, many of us do—then spend some time and money ensuring you have in-built protection.”


This is sage advice. But if you do get a VPN make sure it’s a paid-for, reputable one. Free VPNs, even those sponsored by ads, are often worse than no VPN at all. Just because an app says it’s a secure VPN doesn’t mean anything. Good VPNs will also allow you to identify trusted Wi-Fi networks, such as home and work, and all others will automatically trigger the VPN to load. This is ideal.


All that said, you should not automatically join public hotspots. In your iPhone’s settings, go to “Wi-Fi,” and ensure “Ask to Join Networks” is set to “Ask,” and that “Auto-Join Hotspot” is set to “Ask to Join.” This will stop your iPhone from connecting to new or known networks or personal hotspots without you realizing, giving you the opportunity to exercise caution before clicking “Yes.”





The "Encrygma"

€ 18,000

SuperEncrypted Phone


The Most Advanced Quantum Encrypted Communication System in the World.


Disruptive Offline Communication Tech

(No Internet or Cellular Connection)


Without any Servers involvement


Based on the Secret Tech "White Fog"


No data ever registered on the device or elsewhere.


Immune to:


Interception

Cyber Espionage

Remote Hacking

Spyware Infection

Malware Infection

Forensic Data Extraction

Ransomware attacks

Electronic Surveillance



You have two options , either you can buy the “Encrygma “ SuperEncrypted Phone , full details : www.Encrygma.com, at € 18,000 Euros per device or create your own encryption device by installing our SuperEncryption systems on regular Android and Windows devices at € 5000 Euros per license.


DigitalBank Vault advantages Vs. SKY ECC, BlackBerry, Phantom Secure, Encrochat

and other 'secure communication devices'

1. One-lifetime fee of € 5000 Euro.

No annual subscription fees.

2. Encryption Keys generated by the user only.

Encryption Keys never stored in the device used or anywhere else.

Encryption Keys never exchanged with the communicating parties.

3. No SIM Card needed.

4. Unlimited text messaging, audio and video messaging,

audio calls, file transfers, file storage.

5. "Air-Gapped" Offline Encryption System not connected to the Internet.

6. No Servers involved at any given time, completely autonomous system.

No third parties involved.

7. No registration of any kind - 100% anonymous without username/password.

No online Platform or Interfaces.

8. Unique, Personal, Dedicated Set of

Encryption Algorithms for each individual client.

Totally Private Encryption System.

9. Air Gap Defense Technology:

The Only Offline Communication System in the World.

10. Working cross-platform on Android Smartphones ( No SIM Cards Needed)

and Windows PC ( for office work)

Contact us


for additional information at agents@digitalbankvault.com


Telegram: @timothyweiss WhatsApp: +37257347873 You can buy any Android device and Windows laptops and transform them into a powerful encryption device by installing our set of software. The process is simple , you buy your own phones and laptops devices , choose your most trusted company ( we always advise Samsung phones and Asus laptops , then you buy from us the DigitalBank Vault SuperEncryption System and install it on the devices you bought. If you need the encryption system just for storing and transferring classified files and data, you may need just one license ( it will work for four on both Windows and Androids). If you need to communicate between two people, you will of course need to buy two licenses. If your network of people you need to communicate with is larger , you will have to buy more licenses of course. Each client is receiving a dedicated set of encrypted algorithms that means that each company (client) has a different encryption system, therefore creating a closed private internal network. Each license costs € 5000 Euros. No recurring payments are required. It’s a one-time fee. No monthly payments. Remember that our mission is to help companies achieve total, absolute secrecy over their sensitive data storage, critical file transfers and securing their confidential communications. Feel free to contact us. For more in depth information we can have a voice call or video meeting. Our SuperEncryption systems are needed in case you really need the highest level of secrecy. Our technology is above Governments level , it’s the highest level of anti interception/ anti espionage tech available to the private sector. We sell only and exclusively to reputable companies and individuals that pass our due diligence and KYC procedures. Try for 30 days ( free of charge) the DigitalBank Vault SuperEncryption System. Transform any Android device or Windows Laptop into an Unbreakable Encryption Machine

More information? Visit our website at www.DigitalBankVault.com or email us at info@digitalbankvault.com. We will be happy to assist you in achieving total secrecy over your communications.

How to buy a DigitalBank Vault SuperEncryption system? https://www.digitalbankvault.com/order-the-digitalbank-vault

More details?

Why the DBV SuperEncryption system is safer than any other solution available in the market?

How does the DigitalBank Vault SuperEncryption technology work?






bottom of page