SlideShare a Scribd company logo
1 of 18
Is your WiFi secure?OrIs your data at risk?
So – what’s the issue?
You are at a WiFi hotspot and you want to access the internet....
Unsecure WiFi ISP
Unsecure WiFi Email/Internet  Banking ISP
Unsecure WiFi Email/Internet  Banking ISP Attack Attack Attack
But, because the hotspot is NOT secure, your data is vulnerable to being intercepted, and your security seriously COMPROMISED
Unsecure WiFi Email/Internet  Banking Securifi ISP Attack Attack Attack
Introducing SECURIFI – to provide you a secure “tunnel” for you to protect your data and surf with confidence
Securing WiFi Email/Internet  Banking Securifi ISP Attack Attack Attack
Securing WiFi Email/Internet  Banking Securifi ISP Attack Attack Attack
Secure WiFi Email/Internet  Banking Securifi ISP Attack Attack Attack
Secure WiFi Email/Internet  Banking Securifi ISP Attack Attack Attack
Secure WiFi Email/Internet  Banking Securifi ISP X Attack X X Attack Attack
Secure WiFi Email/Internet  Banking Securifi ISP
Most people are not yet aware what a great difference Securifi can make to their internet security, and by now, you may be asking yourself if you too are at risk. Imagine having your security compromised, and consider what action you can take today.
www.Securifi.wordpress.com Coming soon

More Related Content

What's hot

089 generictoptipsposter
089 generictoptipsposter089 generictoptipsposter
089 generictoptipsposter
Warsi Wa
 
Adult Internet Safety
Adult Internet SafetyAdult Internet Safety
Adult Internet Safety
reidcollins42
 
Security in wireless sensor networks
Security in wireless sensor networksSecurity in wireless sensor networks
Security in wireless sensor networks
Abdulaziz Almaarik
 
Network basic security
Network basic  securityNetwork basic  security
Network basic security
Mohamed Radji
 

What's hot (20)

089 generictoptipsposter
089 generictoptipsposter089 generictoptipsposter
089 generictoptipsposter
 
N5 security precautions
N5 security precautionsN5 security precautions
N5 security precautions
 
Cyber security and crime
Cyber security and crimeCyber security and crime
Cyber security and crime
 
Hacker Tricks: How You Can Protect Yourself
Hacker Tricks: How You Can Protect YourselfHacker Tricks: How You Can Protect Yourself
Hacker Tricks: How You Can Protect Yourself
 
How to Protect your Wi-Fi from Cyber Hackers
How to Protect your Wi-Fi from Cyber HackersHow to Protect your Wi-Fi from Cyber Hackers
How to Protect your Wi-Fi from Cyber Hackers
 
How to keep your laptop & mobile safe
How to keep your laptop & mobile safeHow to keep your laptop & mobile safe
How to keep your laptop & mobile safe
 
Why hackers love public Wi-fi
Why hackers love public Wi-fiWhy hackers love public Wi-fi
Why hackers love public Wi-fi
 
Adult Internet Safety
Adult Internet SafetyAdult Internet Safety
Adult Internet Safety
 
Bolo bhi-nust-stay-safe-online-
Bolo bhi-nust-stay-safe-online-Bolo bhi-nust-stay-safe-online-
Bolo bhi-nust-stay-safe-online-
 
Security in wireless sensor networks
Security in wireless sensor networksSecurity in wireless sensor networks
Security in wireless sensor networks
 
04 secure the human
04 secure the human04 secure the human
04 secure the human
 
03 secure the computer
03 secure the computer03 secure the computer
03 secure the computer
 
5 Common Myths that Stop People from Using an Antivirus
5 Common Myths that Stop People from Using an Antivirus5 Common Myths that Stop People from Using an Antivirus
5 Common Myths that Stop People from Using an Antivirus
 
HMA
HMAHMA
HMA
 
Webinar: Insights from CYREN's 2015 Cyber Threats Yearbook
Webinar: Insights from CYREN's 2015 Cyber Threats YearbookWebinar: Insights from CYREN's 2015 Cyber Threats Yearbook
Webinar: Insights from CYREN's 2015 Cyber Threats Yearbook
 
30 Killer Internet Security Tips
30 Killer Internet Security Tips30 Killer Internet Security Tips
30 Killer Internet Security Tips
 
IoT_Policy
IoT_PolicyIoT_Policy
IoT_Policy
 
Network basic security
Network basic  securityNetwork basic  security
Network basic security
 
CeBIT 2015 Presentation
CeBIT 2015 PresentationCeBIT 2015 Presentation
CeBIT 2015 Presentation
 
Cyber security
Cyber securityCyber security
Cyber security
 

Viewers also liked

Mobile Revolution | Helthcare Technology Trend Presentation | 2009
Mobile Revolution | Helthcare Technology Trend Presentation | 2009Mobile Revolution | Helthcare Technology Trend Presentation | 2009
Mobile Revolution | Helthcare Technology Trend Presentation | 2009
MK (Mary Kathryn) Tantum
 
Flippin gthe classroom using mobile technology - #PedagooLondon2015 presentation
Flippin gthe classroom using mobile technology - #PedagooLondon2015 presentationFlippin gthe classroom using mobile technology - #PedagooLondon2015 presentation
Flippin gthe classroom using mobile technology - #PedagooLondon2015 presentation
Mike Gunn
 
Benefits of sports informative speech
Benefits of sports informative speechBenefits of sports informative speech
Benefits of sports informative speech
wrightamanda14
 
VLSI Training presentation
VLSI Training presentationVLSI Training presentation
VLSI Training presentation
Daola Khungur
 

Viewers also liked (20)

Web & Wireless Hacking
Web & Wireless HackingWeb & Wireless Hacking
Web & Wireless Hacking
 
Mobile Revolution | Helthcare Technology Trend Presentation | 2009
Mobile Revolution | Helthcare Technology Trend Presentation | 2009Mobile Revolution | Helthcare Technology Trend Presentation | 2009
Mobile Revolution | Helthcare Technology Trend Presentation | 2009
 
Flippin gthe classroom using mobile technology - #PedagooLondon2015 presentation
Flippin gthe classroom using mobile technology - #PedagooLondon2015 presentationFlippin gthe classroom using mobile technology - #PedagooLondon2015 presentation
Flippin gthe classroom using mobile technology - #PedagooLondon2015 presentation
 
Role of sports in modern world For Speech 10 minutes
Role of sports in modern world For Speech 10 minutesRole of sports in modern world For Speech 10 minutes
Role of sports in modern world For Speech 10 minutes
 
Benefits of sports informative speech
Benefits of sports informative speechBenefits of sports informative speech
Benefits of sports informative speech
 
Anti tree firesheep
Anti tree firesheepAnti tree firesheep
Anti tree firesheep
 
Advanced WiFi Attacks Using Commodity Hardware
Advanced WiFi Attacks Using Commodity HardwareAdvanced WiFi Attacks Using Commodity Hardware
Advanced WiFi Attacks Using Commodity Hardware
 
05 wi fi network security
05 wi fi network security05 wi fi network security
05 wi fi network security
 
Offline bruteforce attack on WiFi Protected Setup
Offline bruteforce attack on WiFi Protected SetupOffline bruteforce attack on WiFi Protected Setup
Offline bruteforce attack on WiFi Protected Setup
 
Wireless Hacking
Wireless HackingWireless Hacking
Wireless Hacking
 
Offline bruteforce attack on wi fi protected setup
Offline bruteforce attack on wi fi protected setupOffline bruteforce attack on wi fi protected setup
Offline bruteforce attack on wi fi protected setup
 
VLSI Training presentation
VLSI Training presentationVLSI Training presentation
VLSI Training presentation
 
Ethical Hacking & Penetration Testing
Ethical Hacking & Penetration TestingEthical Hacking & Penetration Testing
Ethical Hacking & Penetration Testing
 
Wi-Fi Wireless Fidelity
Wi-Fi Wireless FidelityWi-Fi Wireless Fidelity
Wi-Fi Wireless Fidelity
 
Penetration Testing Execution Phases
Penetration Testing Execution Phases Penetration Testing Execution Phases
Penetration Testing Execution Phases
 
WiFi Secuiry: Attack & Defence
WiFi Secuiry: Attack & DefenceWiFi Secuiry: Attack & Defence
WiFi Secuiry: Attack & Defence
 
Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentation
 
Research methodology for project work for undergraduate students
Research  methodology  for project work for undergraduate  studentsResearch  methodology  for project work for undergraduate  students
Research methodology for project work for undergraduate students
 
Final Year Project Presentation
Final Year Project PresentationFinal Year Project Presentation
Final Year Project Presentation
 
Metasploit for Penetration Testing: Beginner Class
Metasploit for Penetration Testing: Beginner ClassMetasploit for Penetration Testing: Beginner Class
Metasploit for Penetration Testing: Beginner Class
 

Similar to Secure your public WiFi

Public WiFi Hot Spots
Public WiFi Hot SpotsPublic WiFi Hot Spots
Public WiFi Hot Spots
Centextech
 
InfraGard Albany Member Alliance Monthly Security Tips
InfraGard Albany Member Alliance Monthly Security TipsInfraGard Albany Member Alliance Monthly Security Tips
InfraGard Albany Member Alliance Monthly Security Tips
Liberteks
 
Cyber-Leave-Behind-Brochure-Done (1)
Cyber-Leave-Behind-Brochure-Done (1)Cyber-Leave-Behind-Brochure-Done (1)
Cyber-Leave-Behind-Brochure-Done (1)
Sam Norallah
 
It’s time to boost VoIP network security
It’s time to boost VoIP network securityIt’s time to boost VoIP network security
It’s time to boost VoIP network security
Bev Robb
 
Howtohackwirelessinternetconnections 100105124156-phpapp01
Howtohackwirelessinternetconnections 100105124156-phpapp01Howtohackwirelessinternetconnections 100105124156-phpapp01
Howtohackwirelessinternetconnections 100105124156-phpapp01
Alf Tero
 

Similar to Secure your public WiFi (20)

Public WiFi Hot Spots
Public WiFi Hot SpotsPublic WiFi Hot Spots
Public WiFi Hot Spots
 
Wireless Security – From A to Z – Types, Threats, To How to Secure.pdf
Wireless Security – From A to Z – Types, Threats, To How to Secure.pdfWireless Security – From A to Z – Types, Threats, To How to Secure.pdf
Wireless Security – From A to Z – Types, Threats, To How to Secure.pdf
 
Cyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdfCyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdf
 
Wifi Security
Wifi SecurityWifi Security
Wifi Security
 
InfraGard Albany Member Alliance Monthly Security Tips
InfraGard Albany Member Alliance Monthly Security TipsInfraGard Albany Member Alliance Monthly Security Tips
InfraGard Albany Member Alliance Monthly Security Tips
 
972003
972003972003
972003
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber Security
 
parabcswithout-front-200320113631.pdf
parabcswithout-front-200320113631.pdfparabcswithout-front-200320113631.pdf
parabcswithout-front-200320113631.pdf
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cyber-Leave-Behind-Brochure-Done (1)
Cyber-Leave-Behind-Brochure-Done (1)Cyber-Leave-Behind-Brochure-Done (1)
Cyber-Leave-Behind-Brochure-Done (1)
 
Advantages and Disadvantages of VPN (Everything You Need to Know)
Advantages and Disadvantages of VPN (Everything You Need to Know)Advantages and Disadvantages of VPN (Everything You Need to Know)
Advantages and Disadvantages of VPN (Everything You Need to Know)
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
theVIVI-WiFi-Social-Engineering - AfricaHackon 2016
theVIVI-WiFi-Social-Engineering - AfricaHackon 2016theVIVI-WiFi-Social-Engineering - AfricaHackon 2016
theVIVI-WiFi-Social-Engineering - AfricaHackon 2016
 
What Can I Do With a VPN 10 Things to Try.pptx
What Can I Do With a VPN 10 Things to Try.pptxWhat Can I Do With a VPN 10 Things to Try.pptx
What Can I Do With a VPN 10 Things to Try.pptx
 
It’s time to boost VoIP network security
It’s time to boost VoIP network securityIt’s time to boost VoIP network security
It’s time to boost VoIP network security
 
Wireless security
Wireless securityWireless security
Wireless security
 
Howtohackwirelessinternetconnections 100105124156-phpapp01
Howtohackwirelessinternetconnections 100105124156-phpapp01Howtohackwirelessinternetconnections 100105124156-phpapp01
Howtohackwirelessinternetconnections 100105124156-phpapp01
 
Fitsec-remote work and cyber security
Fitsec-remote work and cyber securityFitsec-remote work and cyber security
Fitsec-remote work and cyber security
 
The Network as a Sensor, Cisco and Lancope
The Network as a Sensor, Cisco and LancopeThe Network as a Sensor, Cisco and Lancope
The Network as a Sensor, Cisco and Lancope
 
FREE A4 Cyber Security Posters-Data Protection-GDPR
FREE A4 Cyber Security Posters-Data Protection-GDPRFREE A4 Cyber Security Posters-Data Protection-GDPR
FREE A4 Cyber Security Posters-Data Protection-GDPR
 

Recently uploaded

NewBase 17 May 2024 Energy News issue - 1725 by Khaled Al Awadi_compresse...
NewBase   17 May  2024  Energy News issue - 1725 by Khaled Al Awadi_compresse...NewBase   17 May  2024  Energy News issue - 1725 by Khaled Al Awadi_compresse...
NewBase 17 May 2024 Energy News issue - 1725 by Khaled Al Awadi_compresse...
Khaled Al Awadi
 

Recently uploaded (20)

PitchBook’s Guide to VC Funding for Startups
PitchBook’s Guide to VC Funding for StartupsPitchBook’s Guide to VC Funding for Startups
PitchBook’s Guide to VC Funding for Startups
 
Daftar Rumpun, Pohon, dan Cabang Ilmu (2024).pdf
Daftar Rumpun, Pohon, dan Cabang Ilmu (2024).pdfDaftar Rumpun, Pohon, dan Cabang Ilmu (2024).pdf
Daftar Rumpun, Pohon, dan Cabang Ilmu (2024).pdf
 
Copyright: What Creators and Users of Art Need to Know
Copyright: What Creators and Users of Art Need to KnowCopyright: What Creators and Users of Art Need to Know
Copyright: What Creators and Users of Art Need to Know
 
Inside the Black Box of Venture Capital (VC)
Inside the Black Box of Venture Capital (VC)Inside the Black Box of Venture Capital (VC)
Inside the Black Box of Venture Capital (VC)
 
Falcon Invoice Discounting Setup for Small Businesses
Falcon Invoice Discounting Setup for Small BusinessesFalcon Invoice Discounting Setup for Small Businesses
Falcon Invoice Discounting Setup for Small Businesses
 
How to refresh to be fit for the future world
How to refresh to be fit for the future worldHow to refresh to be fit for the future world
How to refresh to be fit for the future world
 
Elevate Your Online Presence with SEO Services
Elevate Your Online Presence with SEO ServicesElevate Your Online Presence with SEO Services
Elevate Your Online Presence with SEO Services
 
tekAura | Desktop Procedure Template (2016)
tekAura | Desktop Procedure Template (2016)tekAura | Desktop Procedure Template (2016)
tekAura | Desktop Procedure Template (2016)
 
MichaelStarkes_UncutGemsProjectSummary.pdf
MichaelStarkes_UncutGemsProjectSummary.pdfMichaelStarkes_UncutGemsProjectSummary.pdf
MichaelStarkes_UncutGemsProjectSummary.pdf
 
Innomantra Viewpoint - Building Moonshots : May-Jun 2024.pdf
Innomantra Viewpoint - Building Moonshots : May-Jun 2024.pdfInnomantra Viewpoint - Building Moonshots : May-Jun 2024.pdf
Innomantra Viewpoint - Building Moonshots : May-Jun 2024.pdf
 
بروفايل شركة ميار الخليج للاستشارات الهندسية.pdf
بروفايل شركة ميار الخليج للاستشارات الهندسية.pdfبروفايل شركة ميار الخليج للاستشارات الهندسية.pdf
بروفايل شركة ميار الخليج للاستشارات الهندسية.pdf
 
A Brief Introduction About Jacob Badgett
A Brief Introduction About Jacob BadgettA Brief Introduction About Jacob Badgett
A Brief Introduction About Jacob Badgett
 
Chapter 2ppt Entrepreneurship freshman course.pptx
Chapter 2ppt Entrepreneurship freshman course.pptxChapter 2ppt Entrepreneurship freshman course.pptx
Chapter 2ppt Entrepreneurship freshman course.pptx
 
NewBase 17 May 2024 Energy News issue - 1725 by Khaled Al Awadi_compresse...
NewBase   17 May  2024  Energy News issue - 1725 by Khaled Al Awadi_compresse...NewBase   17 May  2024  Energy News issue - 1725 by Khaled Al Awadi_compresse...
NewBase 17 May 2024 Energy News issue - 1725 by Khaled Al Awadi_compresse...
 
HAL Financial Performance Analysis and Future Prospects
HAL Financial Performance Analysis and Future ProspectsHAL Financial Performance Analysis and Future Prospects
HAL Financial Performance Analysis and Future Prospects
 
Blinkit: Revolutionizing the On-Demand Grocery Delivery Service.pptx
Blinkit: Revolutionizing the On-Demand Grocery Delivery Service.pptxBlinkit: Revolutionizing the On-Demand Grocery Delivery Service.pptx
Blinkit: Revolutionizing the On-Demand Grocery Delivery Service.pptx
 
Raising Seed Capital by Steve Schlafman at RRE Ventures
Raising Seed Capital by Steve Schlafman at RRE VenturesRaising Seed Capital by Steve Schlafman at RRE Ventures
Raising Seed Capital by Steve Schlafman at RRE Ventures
 
LinkedIn Masterclass Techweek 2024 v4.1.pptx
LinkedIn Masterclass Techweek 2024 v4.1.pptxLinkedIn Masterclass Techweek 2024 v4.1.pptx
LinkedIn Masterclass Techweek 2024 v4.1.pptx
 
Toyota Kata Coaching for Agile Teams & Transformations
Toyota Kata Coaching for Agile Teams & TransformationsToyota Kata Coaching for Agile Teams & Transformations
Toyota Kata Coaching for Agile Teams & Transformations
 
Sedex Members Ethical Trade Audit (SMETA) Measurement Criteria
Sedex Members Ethical Trade Audit (SMETA) Measurement CriteriaSedex Members Ethical Trade Audit (SMETA) Measurement Criteria
Sedex Members Ethical Trade Audit (SMETA) Measurement Criteria
 

Secure your public WiFi