Placeholder Content Image

Settle in with one of these top reads this winter

<p dir="ltr">It can be challenging deciding on a new book to read, but with these titles releasing throughout July 2023, you’re sure to find something to settle in with.</p> <p dir="ltr">Whether an edge-of-your-seat murder mystery, a laugh-out-loud romantic escapade, or even a deep-space adventure is more your cup of tea, the time has come to dive into your next favourite novel, and maybe even convince your book club to read along with you. </p> <p dir="ltr"><strong>For the budding detectives out there:</strong></p> <ul> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation"><em><a href="https://www.booktopia.com.au/zero-days-ruth-ware/book/9781398508408.html">Zero Days</a></em>, Ruth Ware</p> </li> </ul> <p dir="ltr">“Hired by companies to break into buildings and hack security systems, Jack and her husband Gabe are the best penetration specialists in the business. But after a routine assignment goes horribly wrong, Jack arrives home to find her husband dead. To add to her horror, the police are closing in on their only suspect – her.</p> <p dir="ltr">“On the run and out of options, Jack must decide who she can trust as she circles closer to the truth in this unputdownable and heart-pounding mystery from 'one of the best thriller writers around today' Ruth Ware.”</p> <ul> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation"><em><a href="https://www.booktopia.com.au/four-dogs-missing-rhys-gard/book/9781760687724.html">Four Dogs Missing</a></em>, Rhys Gard</p> </li> </ul> <p dir="ltr">“While estranged twins Oliver and Theo Wingfield are identical in appearance, they couldn't be more different. Theo, an extrovert verging on arrogant, was always a drifter, a nomad, operating on the fringes of the law. Oliver, intense, creative and introspective, was destined to become a winemaker. Each vintage, every bottle from Oliver's Mudgee-based label, Four Dogs Missing, sells out.</p> <p dir="ltr">“And now, after fifteen years without contact, Theo unexpectedly turns up at his brother's vineyard, bearing an invitation that his twin knows nothing about. The quiet and fulfilling life that the winemaker has built for himself is about to change overnight: Theo's arrival is the catalyst for a series of murders involving those closest to Oliver. Finding himself the main suspect, Oliver soon discovers that not everyone in Mudgee supports a reclusive and unorthodox vigneron who's shied away from the community that helped him succeed.</p> <p dir="ltr">“Oliver is inexorably drawn into a sinister world where poisoned liquor and stolen art leave a deadly trail. Abandoning his grapevines, he sets out to solve the crimes – and confront his damaged past – before someone else he loves is found dead … beside a bottle of his own wine.”</p> <ul> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation"><em><a href="https://www.booktopia.com.au/none-of-this-is-true-lisa-jewell/book/9781529195989.html">None of This is True</a></em>, Lisa Jewell </p> </li> </ul> <p dir="ltr">“Celebrating her 45th birthday at her local pub, popular podcaster Alix Summers crosses paths with an unassuming woman called Josie Fair. Josie, it turns out, is also celebrating her 45th birthday. They are, in fact, birthday twins.</p> <p dir="ltr">“A few days later, Alix and Josie bump into each other again, this time outside Alix's children's school. Josie has been listening to Alix's podcasts and thinks she might be an interesting subject for her series. She is, she tells Alix, on the cusp of great changes in her life.</p> <p dir="ltr">“Josie's life appears to be strange and complicated, and although Alix finds her unsettling, she can't quite resist the temptation to keep making the podcast.</p> <p dir="ltr">“Slowly Alix starts to realise that Josie has been hiding some very dark secrets, and before she knows it Josie has inveigled her way into Alix's life - and into her home.</p> <p dir="ltr">“But, as quickly as she arrived, Josie disappears. Only then does Alix discover that Josie has left a terrible and terrifying legacy in her wake, and that Alix has become the subject of her own true crime podcast, her life and her family's lives under mortal threat.</p> <p dir="ltr">“Who is Josie Fair? And what has she done?”</p> <p dir="ltr"><strong>For the sci-fi fanatics:</strong></p> <ul> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation"><em><a href="https://www.booktopia.com.au/circle-of-death-james-patterson/book/9781529136630.html">Circle of Death</a></em>, James Patterson</p> </li> </ul> <p dir="ltr">“Since Lamont Cranston - known to a select few as the Shadow - defeated Shiwan Khan and ended his reign of terror over New York one year ago, the city has started to regenerate.</p> <p dir="ltr">“But there is evil brewing elsewhere. And this time the entire world is under threat.</p> <p dir="ltr">“Which is why Lamont has scoured the globe to assemble a team with unmatched talent.</p> <p dir="ltr">“Only their combined powers can foil an enemy with ambitions and abilities beyond anyone's deepest fears.</p> <p dir="ltr">“As their mission takes them across the globe and into the highest corridors of power - pushing them beyond their limits - can justice prevail?”</p> <ul> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation"><em><a href="https://www.booktopia.com.au/a-psalm-for-the-wild-built-becky-chambers/book/9781250320216.html">A Psalm for the Wild-Built</a></em>, Becky Chambers</p> </li> </ul> <p dir="ltr">“It's been centuries since the robots of Panga gained self-awareness and laid down their tools; centuries since they wandered, en masse, into the wilderness, never to be seen again; centuries since they faded into myth and urban legend.</p> <p dir="ltr">“One day, the life of a tea monk is upended by the arrival of a robot, there to honor the old promise of checking in. The robot cannot go back until the question of "what do people need?" is answered.</p> <p dir="ltr">“But the answer to that question depends on who you ask, and how.</p> <p dir="ltr">“They're going to need to ask it a lot.</p> <p dir="ltr">“Becky Chambers's new series asks: in a world where people have what they want, does having more matter?”</p> <ul> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation"><em><a href="https://www.booktopia.com.au/the-mother-fault-kate-mildenhall/book/9781760859848.html">The Mother Fault</a></em>, Kate Mildenhall</p> </li> </ul> <p dir="ltr">“Mim’s husband is missing. No one knows where Ben is, but everyone wants to find him – especially The Department. And they should know, the all-seeing government body has fitted the entire population with a universal tracking chip to keep them ‘safe’.</p> <p dir="ltr">“But suddenly Ben can’t be tracked. And Mim is questioned, made to surrender her passport and threatened with the unthinkable – her two children being taken into care at the notorious BestLife.</p> <p dir="ltr">“From the stark backroads of the Australian outback to a terrifying sea voyage, Mim is forced to shuck off who she was – mother, daughter, wife, sister – and become the woman she needs to be to save her family and herself.”</p> <p dir="ltr"><strong>For those with a passion for romance: </strong></p> <ul> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation"><a href="https://www.booktopia.com.au/palazzo-danielle-steel/book/9781529022421.html"><em>Palazzo</em></a>, Danielle Steel</p> </li> </ul> <p dir="ltr">“After her parents perish in a tragic accident, Cosima Saverio assumes leadership of her family's haute couture Italian leather brand. While navigating the challenges of running a company at twenty-three, Cosima must also maintain the elegant four-hundred-year-old family palazzo in Venice and care for her younger siblings: Allegra, who survived the tragedy that killed their parents, and Luca, who has a penchant for wild parties, pretty women, and poker tables.</p> <p dir="ltr">“Cosima navigates her personal and professional challenges with a wisdom beyond her years, but her success has come at a cost: Her needs are always secondary. She's married to the business, and her free time is given to those who rely on her . . . until she meets Olivier Bayard, the founder of France's most successful ready-to-wear handbag company.</p> <p dir="ltr">“But Luca's gambling habit gets out of control and Cosima is forced to make an impossible choice to save him. The palazzo, the family business or cut Luca loose. Or is there another way to rescue everything she has fought for before it goes up in flames?”</p> <ul> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation"><a href="https://www.booktopia.com.au/the-willow-tree-wharf-leonie-kelsall/book/9781761066092.html"><em>The Willow Tree Wharf</em></a>, Leonie Kelsall</p> </li> </ul> <p dir="ltr">“Samantha, owner of Settlers Bridge cafe Ploughs and Pies, is short on confidence and big on regrets. Married young to fill the void left by an unhappy childhood, she still works in the same small town where she grew up, too filled with self-doubt and insecurity to ever risk spreading her wings. Yet will the end of her abusive marriage force her to start anew?</p> <p dir="ltr">“City restaurateur Pierce di Angelis knows what it is to have his career and family ripped away. However, a chance encounter with the intriguing Samantha ignites his passion, and together they concoct a plan for a destination restaurant.</p> <p dir="ltr">“But, with their personalities like oil and water, will old hurts and hidden truths destroy the new business before it's afloat?”</p> <ul> <li dir="ltr" aria-level="1"> <p dir="ltr" role="presentation"><em><a href="https://www.booktopia.com.au/the-forgotten-bookshop-in-paris-daisy-wood/book/9780008525248.html">The Forgotten Bookshop in Paris</a></em>, Daisy Wood</p> </li> </ul> <p dir="ltr">“Paris, 1940: War is closing in on the city of love. With his wife forced into hiding, Jacques must stand by and watch as the Nazis take away everything he holds dear. Everything except his last beacon of hope: his beloved bookshop, La Page Cachée.</p> <p dir="ltr">“But when a young woman and her child knock on his door one night and beg for refuge, he knows his only option is to risk it all once more to save a life…</p> <p dir="ltr">“Modern day: Juliette and her husband have finally made it to France on the romantic getaway of her dreams – but as the days pass, all she discovers is quite how far they’ve grown apart. She’s craving a new adventure, so when she happens across a tiny, abandoned shop with a for-sale sign in the window, it feels fated.</p> <p dir="ltr">“And she’s about to learn that the forgotten bookshop hides a lot more than meets the eye…”</p> <p dir="ltr"><em>Images: Getty</em></p>

Books

Placeholder Content Image

Frankenstein: how Mary Shelley’s sci-fi classic offers lessons for us today about the dangers of playing God

<p><a href="https://www.penguin.com.au/books/frankenstein-9780241425121" target="_blank" rel="noopener">Frankenstein, or, The Modern Prometheus</a>, is an 1818 novel by Mary Wollstonecraft Shelley. Set in the late 18th century, it follows scientist Victor Frankenstein’s creation of life and the terrible events that are precipitated by his abandonment of his creation. It is a <a href="https://en.wikipedia.org/wiki/Gothic_fiction" target="_blank" rel="noopener">Gothic novel</a> in that it combines supernatural elements with horror, death and an exploration of the darker aspects of the psyche.</p> <p>It also provides a complex critique of Christianity. But most significantly, as one of the first works of science-fiction, it explores the dangers of humans pursuing new technologies and becoming God-like.</p> <h2>The celebrity story</h2> <p>Shelley’s Frankenstein is at the heart of what might be the greatest celebrity story of all time. Shelley was born in 1797. Her mother, <a href="https://en.wikipedia.org/wiki/Mary_Wollstonecraft" target="_blank" rel="noopener">Mary Wollstonecraft</a>, author of the landmark A Vindication of the Rights of Women (1792), was, according to that book’s introduction, “the first major feminist”.</p> <p>Shelley’s father was <a href="https://plato.stanford.edu/entries/godwin/" target="_blank" rel="noopener">William Godwin</a>, political philosopher and founder of “philosophical anarchism” – he was anti-government in the moment that the great democracies of France and the United States were being born. When she was 16, Shelley eloped with radical poet <a href="https://en.wikipedia.org/wiki/Percy_Bysshe_Shelley" target="_blank" rel="noopener">Percy Shelley</a>, whose <a href="https://www.poetryfoundation.org/poems/46565/ozymandias" target="_blank" rel="noopener">Ozymandias</a> (1818) is still regularly quoted (“Look on my Works, ye Mighty, and despair!”).</p> <p>Their relationship seems to epitomise the Romantic era itself. It was crossed with outside love interests, illegitimate children, suicides, debt, wondering and wandering. And it ultimately came to an early end in 1822 when Percy Shelley drowned, his small boat lost in a storm off the Italian coast. The Shelleys also had a close association with the poet <a href="https://en.wikipedia.org/wiki/Lord_Byron" target="_blank" rel="noopener">Lord Byron</a>, and it is this association that brings us to Frankenstein.</p> <p>In 1816 the Shelleys visited Switzerland, staying on the shores of Lake Geneva, where they were Byron’s neighbours. As Mary Shelley tells it, they had all been reading ghost stories, including Coleridge’s <a href="https://www.poetryfoundation.org/poems/43971/christabel" target="_blank" rel="noopener">Christabel</a> (Coleridge had visited her father at the family house when Shelley was young), when Byron suggested that they each write a ghost story. Thus 18-year-old Shelley began to write Frankenstein.</p> <h2>The myth of the monster</h2> <p>The popular imagination has taken Frankenstein and run with it. The monster “Frankenstein”, originally “Frankenstein’s monster”, is as integral to Western culture as the characters and tropes from Lewis Carroll’s Alice’s Adventures in Wonderland.</p> <p>But while reasonable continuity remains between Carroll’s Alice and its subsequent reimaginings, much has been changed and lost in the translation from Shelley’s novel into the many versions that are rooted in the popular imagination.</p> <p>There have been many varied adaptations, from <a href="https://youtu.be/TBHIO60whNw" target="_blank" rel="noopener">Edward Scissorhands</a> to <a href="https://www.youtube.com/watch?v=LGzc0pIjHqw" target="_blank" rel="noopener">The Rocky Horror Picture Show</a> (see <a href="https://www.theguardian.com/film/2021/feb/11/the-20-best-frankenstein-films-ranked" target="_blank" rel="noopener">here</a> for a top 20 list of Frankenstein films). But despite the variety, it’s hard not to think of the “monster” as a zombie-like implacable menace, as we see in the <a href="https://youtu.be/BN8K-4osNb0" target="_blank" rel="noopener">trailer to the 1931 movie</a>, or a lumbering fool, as seen in <a href="https://youtu.be/nBV8Cw73zhk" target="_blank" rel="noopener">the Herman Munster incarnation</a>. Further, when we add the prefix “franken” it’s usually with disdain; consider “frankenfoods”, which refers to genetically modified foods, or “frankenhouses”, which describes contemporary architectural monstrosities or bad renovations.</p> <p>However, in Shelley’s novel, Frankenstein’s creation is far from being two-dimensional or contemptible. To use the motto of the Tyrell corporation, which, in the 1982 movie Bladerunner, creates synthetic life, the creature strikes us as being “more human than human”. Indeed, despite their dissimilarities, <a href="https://www.youtube.com/watch?v=NoAzpa1x7jU" target="_blank" rel="noopener">the replicant Roy Batty in Bladerunner reproduces Frankenstein’s creature’s intense humanity</a>.</p> <h2>Some key elements in the plot</h2> <p>The story of Victor Frankenstein is nested within the story of scientist-explorer Robert Walton. For both men, the quest for knowledge is mingled with fanatical ambition. The novel begins towards the end of the story, with Walton, who is trying to sail to the North Pole, rescuing Frankenstein from <a href="https://upload.wikimedia.org/wikipedia/commons/thumb/0/0c/Caspar_David_Friedrich_-_Das_Eismeer_-_Hamburger_Kunsthalle_-_02.jpg/1280px-Caspar_David_Friedrich_-_Das_Eismeer_-_Hamburger_Kunsthalle_-_02.jpg" target="_blank" rel="noopener">sea ice</a>. Frankenstein is being led northwards by his creation towards a final confrontation.</p> <p>The central moment in the novel is when Frankenstein brings his creation to life, only to be immediately repulsed by it:</p> <blockquote> <p>I had worked hard for nearly two years, for the sole purpose of infusing life into an inanimate body. For this I had deprived myself of rest and health. I had desired it with an ardour that far exceeded moderation but now that I had finished, the beauty of the dream vanished, and breathless horror and disgust filled my heart.</p> </blockquote> <p>Victor Frankenstein, like others in the novel, is appalled by the appearance of his creation. He flees the creature and it vanishes. After a hiatus of two years, the creature begins to murder people close to Frankenstein. And when Frankenstein reneges on his promise to create a female partner for his creature, it murders his closest friend and then, on Frankenstein’s wedding night, his wife.</p> <h2>More human than human</h2> <p>The real interest of the novel lies not in the murders or the pursuit, but in the creature’s accounts of what drove him to murder. After the creature murders Frankenstein’s little brother, William, Frankenstein seeks solace in the Alps – in <a href="https://en.wikipedia.org/wiki/Wanderer_above_the_Sea_of_Fog#/media/File:Caspar_David_Friedrich_-_Wanderer_above_the_sea_of_fog.jpg" target="_blank" rel="noopener">sublime nature</a>. There, the creature comes upon Frankenstein and eloquently and poignantly relates his story.</p> <p>We learn that the creature spent a year secretly living in an outhouse attached to a hut occupied by the recently impoverished De Lacey family. As he became self-aware, the creature reflected that, “To be a great and virtuous man appeared the highest honour that can befall a sensitive being.” But when he eventually attempted to reveal himself to the family to gain their companionship, he was brutally driven from them. The creature was filled with rage. He says, “I could … have glutted myself with their shrieks and misery.” More human than human.</p> <p>After Victor Frankenstein dies aboard Walton’s ship, Walton has a final encounter with the creature, as it looms over Frankenstein’s body. To the corpse, the creature says:</p> <blockquote> <p>“Oh Frankenstein! Generous and self-devoted being! What does it avail that I now ask thee to pardon me? I, who irretrievably destroyed thee by destroying all thou lovedst.”</p> </blockquote> <p>The creature goes on to make several grand and tragic pronouncements to Walton. “My heart was fashioned to be susceptible of love and sympathy; and when wrenched by misery to vice and hatred, it did not endure the violence of the change, without torture such as you cannot even imagine.” And shortly after, about the murder of Frankenstein’s wife, the creature says: “I knew that I was preparing for myself a deadly torture; but I was the slave, not the master, of an impulse, which I detested, yet could not disobey.”</p> <p>These remarks encourage us to ponder some of the weightiest questions we can ask about the human condition:</p> <blockquote> <p>What is it that drives humans to commit horrible acts? Are human hearts, like the creature’s, fashioned for ‘love and sympathy’, and when such things are withheld or taken from us, do we attempt to salve the wound by hurting others? And if so, what is the psychological mechanism that makes this occur?</p> </blockquote> <p>And what is the relationship between free will and horrible acts? We cannot help but think that the creature remains innocent – that he is the slave, not the master. But then what about the rest of us?</p> <p>The rule of law generally blames individuals for their crimes – and perhaps this is necessary for a society to function. Yet I suspect the rule of law misses something vital. Epictetus, the stoic philosopher, considered such questions millennia ago. He asked:</p> <blockquote> <p>What grounds do we have for being angry with anyone? We use labels like ‘thief’ and ‘robber’… but what do these words mean? They merely signify that people are confused about what is good and what is bad.</p> </blockquote> <h2>Unintended consequences</h2> <p>Victor Frankenstein creates life only to abandon it. An unsympathetic interpretation of Christianity might see something similar in God’s relationship with humanity. Yet the novel itself does not easily support this reading; like much great art, its strength lies in its ambivalence and complexity. At one point, the creature says to Frankenstein: “Remember, that I am thy creature; I ought to be thy Adam, but I am rather the fallen angel, whom thou drivest from joy for no misdeed.” These and other remarks complicate any simplistic interpretation.</p> <p>In fact, the ambivalence of the novel’s religious critique supports its primary concern: the problem of technology allowing humans to become God-like. The subtitle of Frankenstein is “The Modern Prometheus”. In the Greek myth, <a href="https://en.wikipedia.org/wiki/Prometheus" target="_blank" rel="noopener">Prometheus</a> steals fire – a technology – from the gods and gives it to humanity, for which he is punished. In this myth and many other stories, technology and knowledge are double-edged. Adam and Eve eat the apple of knowledge in the Garden of Eden and are ejected from paradise. In 2001: A Space Odyssey, <a href="https://youtu.be/RWCvMwivrDk" target="_blank" rel="noopener">humanity is born when the first tool is used</a> – a tool that augments humanity’s ability to be violent.</p> <p>The novel’s subtitle is referring to Kant’s 1755 essay, “The Modern Prometheus”. In this, Kant observes that:</p> <blockquote> <p>There is such a thing as right taste in natural science, which knows how to distinguish the wild extravagances of unbridled curiosity from cautious judgements of reasonable credibility. From the Prometheus of recent times Mr. Franklin, who wanted to disarm the thunder, down to the man who wants to extinguish the fire in the workshop of Vulcanus, all these endeavors result in the humiliating reminder that Man never can be anything more than a man.</p> </blockquote> <p>Victor Frankenstein, who suffered from an unbridled curiosity, says something similar:</p> <blockquote> <p>A human being in perfection ought always to preserve a calm and peaceful mind … If the study to which you apply yourself has a tendency to weaken your affections, and to destroy your taste for those simple pleasures in which no alloy can possibly mix, then that study is certainly unlawful, that is to say, not befitting the human mind.</p> </blockquote> <p>And also: “Learn from me … how dangerous is the acquirement of knowledge and how much happier that man is who believes his native town to be the world, than he who aspires to become greater than his nature will allow.”</p> <p>In sum: be careful what knowledge you pursue, and how you pursue it. Beware playing God.</p> <p>Alas, history reveals the quixotic nature of Shelley and Kant’s warnings. There always seems to be a scientist somewhere whose dubious ambitions are given free rein. And beyond this, there is always the problem of the unintended consequences of our discoveries. Since Shelley’s time, we have created numerous things that we fear or loathe such as the atomic bomb, cigarettes and other drugs, chemicals such as DDT, and so on. And as our powers in the realms of genetics and artificial intelligence grow, we may yet create something that loathes us.</p> <p>It all reminds me of sociobiologist Edward O. Wilson’s relatively recent (2009) remark <a href="https://www.oxfordreference.com/view/10.1093/acref/9780191826719.001.0001/q-oro-ed4-00016553" target="_blank" rel="noopener">that</a>, “The real problem of humanity is the following: we have Paleolithic emotions, medieval institutions, and god-like technology.”</p> <p><em><strong>This article originally appeared on <a href="https://theconversation.com/frankenstein-how-mary-shelleys-sci-fi-classic-offers-lessons-for-us-today-about-the-dangers-of-playing-god-175520" target="_blank" rel="noopener">The Conversation</a>.</strong></em></p> <p><em>Image: Shutterstock</em></p>

Books

Placeholder Content Image

Signs that someone is stealing your Wi-Fi

<p><em>Image: Getty </em></p> <p><strong>Slow Internet Speed </strong></p> <p>According to Alex Hamerstone, an expert in cyber security, there are some tell-tale signs you have a Wi-Fi thief, the most pedestrian of which is decreased Internet speed. Of course, there could be a whole host of reasons you’re experiencing slower Internet. But if you’re regularly noticing “slower Internet speeds, or more buffering,” you should consider that someone might be stealing your Wi-Fi.</p> <p><strong>Unusual Ads</strong></p> <p><span>One of the for-better-or-worse hallmarks of the Internet age is advertising – specifically, those weirdly accurate ads that pop up in pretty much all of your browsers, a subtle reminder that your activity is being monitored. But if you suddenly start noticing ads that seem distinctly not you, this is often a sign that your Wi-Fi has a squatter, Hamerstone says. “The Wi-Fi thief is likely sharing your IP address, and their browsing history could influence the ads that pop up in your browser while you’re surfing the web,” he explains. “In most cases, that will just be annoying, but it could also be harmful if the Wi-Fi thief is viewing adult or inappropriate content from your network, leading to similar adult-themed ads that pop-up in your Internet sessions.” If this happens, you’ll want to take action immediately.</span></p> <p><strong>Above Average Bills</strong></p> <p><span>If someone is stealing your Wi-Fi, the consequences could be financial as well as annoying and inconvenient. Hamerstone warns, “If you…pay based on how much data you use, or pay when you go over a certain amount of data in a month, then you may get unexpectedly high bills for exorbitant data usage.” If you’re suddenly charged far more than usual for your data bill, you might want to consider that your Wi-Fi network has an uninvited guest.</span></p> <p><strong>Unfamiliar Devices</strong><span></span></p> <p><span>If you start to suspect that your Wi-Fi is the target of a thief, you should check your router by logging in to see all of the devices connected to your network. If there’s a device that is definitely not something someone in your household owns, you should probably look into it further to identify it. Be advised, though, that just because a device’s name seems unusual doesn’t mean it’s an interloper. “Don’t be immediately alarmed if you see something that looks odd at first – devices may have unfamiliar names that don’t obviously correlate to what the device is,” Hamerstone says.</span></p> <p><strong>Spam Notifications </strong></p> <p><span>This is another consequence that’ll likely only happen if the Wi-Fi thief is engaging in sketchy or illegal online behaviour—and it’s not something you want. “A Wi-Fi thief could also cause your home IP address to get red-flagged by the various spam engines which are relied upon by the major email services and network security providers,” Hamerstone explains. And if this happens, you’ll experience the effects: “The emails you send from your home Wi-Fi network could be blocked altogether or filtered to spam folders because the thief has ruined your IP reputation.” Needless to say, this could become a major issue if you’re heavily reliant on your Internet, especially right now.</span></p> <p><strong>Issues with Your Personal Device or Data</strong></p> <p><span>Of course, Wi-Fi powers more than just computers nowadays. If you start encountering privacy issues with other “smart” or Internet-enabled devices, you could be experiencing the effects of a Wi-Fi thief. “If someone is using your Wi-Fi, then there is a good chance they also have access to any personal devices that share the same network,” says Hamerstone. “This could include laptops, phones, game consoles, printers – even Roku devices and security cameras.” They may not care – they could simply just be trying to snag some free Internet. But worst-case scenario, they could start accessing your personal information. And if your information isn’t properly secured, the Wi-Fi thief could gain access to your bank account or other sensitive content.</span></p> <p><strong>Legal Action </strong></p> <p><span>In very serious cases, a belligerent Wi-Fi thief could result in a visit from police. “If the Wi-Fi thief is using your Wi-Fi network to commit crimes, such as making threats to people or accessing illegal content, then it is your IP address that will be linked to the illegal activity and you who will be accused of the crime,” warns Hamerstone. Needless to say, this is when Wi-Fi theft turns into a massive problem: “It can lead to a long and expensive nightmare of trying to prove that you are not a criminal,” Hamerstone says. Even if the thief is committing subtler “crimes” like piracy, that’s still not something you want to be blamed for.</span></p> <p><strong>So, how do I prevent Wi-Fi theft?</strong></p> <p><span>There’s one primary way to keep unwanted Wi-Fi lurkers out: Choose a strong password. Pick a password that only your household will know, and be very careful about who, if anyone, you share it with. “Be especially careful about sharing your password with people who live close enough to use your Wi-Fi from their house or apartment!” Hamerstone advises. It’s not foolproof, as a talented hacker could crack your password, but “this simple step will prevent most instances of opportunistic Wi-Fi theft,” Hamerstone sums up. He also recommends setting up a separate “Guest” network and/or a 5G network, making sure they’ve all got strong passwords. Finally, you should consider using a VPN, which, in addition to keeping you safe on public Wi-Fi, can also protect your information on your own network.</span></p> <p><span>Preventing this theft is all well and good, but what if you think you’ve fallen victim to it? The first step, Hamerstone says, is to check your router.  “Follow the instructions provided with your router to login to your admin account, and from here you can check to see which devices are connecting to your network,” he says. There are also tools, like the free Fing app, that can identify all of the devices using your Wi-Fi. If you identify an unwelcome device, here’s what to do: “Immediately change both your Wi-Fi network password and the router admin login password, just in case the person had access to this as well,” Hamerstone advises. “You should also reboot your router and check for any software or firmware updates that will improve the device’s operation and security.”</span></p> <p><span>This article originally appeared on <a href="https://www.readersdigest.com.au/true-stories-lifestyle/science-technology/signs-that-someone-is-stealing-your-wi-fi">Readers Digest</a>. </span></p>

Legal

Placeholder Content Image

How do Wi-Fi and hotspots work?

<div class="copy"> <p>If you’re reading this article on your smartphone or laptop, it’s more than likely you’re connected to a wireless router. <span style="font-family: inherit;">No need for bulky cables – just pick the wireless signal you want and the World Wide Web is at your fingertips. </span></p> <p>This is all thanks to the power of Wi-Fi. So how does it actually work?</p> <p><span style="font-family: inherit;">If you wanted to connect to the internet before Wi-Fi (which, by the way, doesn’t stand for wireless fidelity – it doesn’t actually stand for anything) you needed a cable known as an ethernet cable. </span></p> <p>This cable converts 1s and 0s of binary, the language of computers, into electrical signals which are sent down a wire and converted back into binary by the computer.</p> <p>But in the case of Wi-Fi, those electrical signals are converted by a router to radio waves that carry the electrical signal to the computer, where they’re converted to binary again.</p> <p>Information is sent as lots of small packets that are then stitched together.</p> <p>The process also works in reverse. If you need to send an email, your computer or smartphone shoots radio waves to the router.</p> <p>The radio waves are very similar to those used in mobile phones, walkie-talkies and other devices.</p> <p>So how can radio waves carry the amount of information needed to watch a high-resolution cat video?</p> <p>It’s true: the amount of information transmitted to make a phone call (audio) is far less than to watch an online video (audio and visual).</p> <p>This boils down to the radio wave frequency. Wi-Fi uses either 2.4 gigahertz or 5 gigahertz – far higher than those used by mobile phones at less than 1 gigahertz.</p> <p>A higher frequency means more radio waves – and more data – can be packed into a given space.</p> <p>The trade-off is that the waves can’t travel as far and are heavily influenced by nearby objects, including other Wi-Fi signals.</p> <p>That’s why your Wi-Fi signal gets weaker the more walls you put between your computer and router.</p> <p>You can get around this by linking lots of routers together to boost the signal. This is how the internet hotspots found in places such as cafes, universities and office buildings manage to reach out across multiple levels and large distances.</p> <p>For instance, the University of Twente in the Netherlands has a hotspot covering 1.4 square kilometres. It combines more than 600 individual routers from one massive signal that all students and staff can access at the same time.</p> <em>Image credits: Shutterstock            <!-- Start of tracking content syndication. Please do not remove this section as it allows us to keep track of republished articles --> <img id="cosmos-post-tracker" style="opacity: 0; height: 1px!important; width: 1px!important; border: 0!important; position: absolute!important; z-index: -1!important;" src="https://syndication.cosmosmagazine.com/?id=12344&amp;title=How+do+Wi-Fi+and+hotspots+work%3F" alt="" width="1" height="1" /> <!-- End of tracking content syndication -->          </em></div> <div id="contributors"> <p><em>This article was originally published on cosmosmagazine.com and was written by Jake Port. </em></p> </div>

Technology

Placeholder Content Image

How to stop hackers from attacking your mobile phone while online shopping

<p><span style="font-weight: 400;">In new research revealed by Norton’s cyber safety insight report, about 30 per cent of shoppers have fallen victim to cybercrime in the past year at a cost of a shocking $1.3 billion.</span></p> <p><span style="font-weight: 400;">The report noted that 21 per cent of smartphone users had no idea that their device was able to be hacked.</span></p> <p><span style="font-weight: 400;">Cybercrime expert Julian Plummer agrees that users are laxer about mobile security compared to their laptops.</span></p> <p><span style="font-weight: 400;">“As mobile becomes increasingly de rigueur the security risk to consumers will only rise,” said Mr Plummer, who is the managing director of Midwinter Financial Services in Sydney.</span></p> <p><span style="font-weight: 400;">There are two ways that your smartphone is able to be hacked, which is phishing and over public wi-fi networks.</span></p> <p><span style="font-weight: 400;">As hackers are only getting smarter at duping their victims when it comes to phishing, sophisticated criminals are now impersonating big-name brands, including banks and other institutions.</span></p> <p><span style="font-weight: 400;">“It used to be that seeing a padlock in the URL bar meant that the site was safe, but now hackers are ‘securing’ their sites using cheap security certificates to provide a false sense of security,” Mr Plummer warned to </span><a href="https://thenewdaily.com.au/life/tech/2019/05/29/mobile-phone-cybercrime-safety/"><span style="font-weight: 400;"><em>The New Daily</em></span></a><span style="font-weight: 400;">.</span></p> <p><span style="font-weight: 400;">The second way is via public Wi-Fi networks, which is surprisingly sophisticated.</span></p> <p><span style="font-weight: 400;">“Hackers use a ‘Wi-Fi pineapple’ to mimic a public wi-fi access point,” he explained.</span></p> <p><span style="font-weight: 400;">“Unfortunately, logging on to these malicious wi-fi access points allows hackers to intercept any unencrypted personal data. Always be very wary when connecting to an untrusted wi-fi network – especially overseas.”</span></p> <p><span style="font-weight: 400;">It’s easy to protect yourself from hackers though, according to Mr Plummer.</span></p> <p><span style="font-weight: 400;">“The crucial thing for mobile phone users is to stop reusing passwords,” Mr Plummer said.</span></p> <p><span style="font-weight: 400;">“With a major security breach happening almost on a monthly basis, if hackers were to get your password from one shopping website, they then have access to all your online accounts if you re-use your password.”</span></p> <p><span style="font-weight: 400;">The second way to keep your information safe might be tedious, but it’ll be worth it in the long run. It involves keeping your phone’s operating system up to date.</span></p> <p><span style="font-weight: 400;">“The main reason manufacturers provide updates is to close off security loopholes within their device,” Mr Plummer said.</span></p> <p><span style="font-weight: 400;">“Hackers are well versed in any security bugs in your mobile device, so make sure you have automatic updates turned on for your mobile phone.”</span></p>

Technology

Placeholder Content Image

Why are hotels still charging for Wi-Fi?

<p>"Hi, how are you going? Beautiful day here isn't it? What's the wifi password here?" is an accurate, if sad, greeting that has become second-nature to the traveller.</p> <p>I'll have barely dumped my bags bedside at the Airbnb apartment before I'm scoping out the kitchen for the hosts list of house rules always signed off with the accommodation's username and password for the internet.</p> <p>Nothing sees an Airbnb host's review rating sink like a shoddy connection of a wifi blackspot. And yes, I'm guilty of upping and leaving a cafe if the wifi password isn't forthcoming.</p> <p>But please, save your tut-tutting about "living in the moment" (I do, I just want it to be the best moment, with the most 5 star reviews on Time Out and Tripadvisor).</p> <p>If I were to go "off the grid" and ditch the devices, I'm but a drop in the ocean of migrating travellers traversing the globe with one eye on their smartphones.</p> <p>Instead, and rightly so, the travel market and businesses have skewed their offerings toward the connected travel experience. All backpackers know they must have a top-notch wi-fi coverage to match their top notch bar crawls. Any airport worth its salt offers you some megabytes to sort out how to trek into town or brag about your visit to the airline lounge. So it more than a bit grating that certain hotel chains still think they can get away with charging for wi-fi.</p> <p>At a daily rate. For pitiful data allowances. The Super-King beds with 1000 thread count sheets, poolside bars and posh pampering products build an image of a grandeur that can't help but be cheapened by a charge for what's become a modern day necessity.</p> <p>The Hilton trying to charge £13 per day (per day!) was ridiculous. What will I be pinged for next: Television access and hot water?</p> <p>I know that the internet was the death-knell for the long-time money-spinner for motels and hotels – the pay-per-view movie.</p> <p>As audiences switch from Sky Movies to Netflix, the hotel chains wish to keep clipping the ticket, by placing internet access into the revenue-generating column as pay-per-view films once were. They were a real money spinner – just ask Shane Jones.</p> <p>The point is now, two decades on from the internet's arrival it should be a given that these charges won't be sorted out with a quick swipe of the company credit card. You're now more likely to find guests jumping on the wi-fi to post a poolside pic to Snapchat or find a secret nightspot on Tripadvisor than to upload documents to a company website or make a conference call.</p> <p>So it makes smart business sense to have young, plugged-in guests able to document their stay in your property and the majority of smart hotel managers have relegated high internet access charges to history. The rest now need to follow.</p> <p>And I get it, it's never going to be "free wi-fi", it's simply another cost to be incorporated into your standard room rate along with other necessities like electricity, running water and fluffy white robes.</p> <p>But to ping us for each Facebook post or Google Map navigation is no way to court loyalty in the Instagram generation and converts us to Airbnb at a rate that could rival even the fastest hotel internet speeds.</p> <p><em>Written by Josh Martin. First appeared on <a href="http://www.stuff.co.nz/" target="_blank"><strong><span style="text-decoration: underline;">Stuff.co.nz</span></strong></a>.</em></p>

Technology

Placeholder Content Image

Outrageous Wi-Fi network name forces plane’s emergency landing

<p><span>A plane with 100 passengers on board was forced to make an emergency landing after a passenger gave a Wi-Fi network a very inappropriate name.</span></p> <p><span>The Turkish Airlines flight from Nairobi, Kenya to Istanbul, Turkey was diverted after the Wi-Fi name “bomb on board” caused concern among passengers.</span></p> <p><span>The airline said the plane landed at the Khartoum airport in Sudan and the flight was resumed after a security check of all passengers and the aircraft was carried out.</span></p> <p><span>“Experts said the Wi-Fi network in question was created on board. No irregularities were seen after security procedures were carried out, and passengers were brought back on the plane once boarding restarted,” Turkish Airlines said in a statement.</span></p> <p><span>The airline did not say whether authorities identified the passenger who had named the Wi-Fi network, however, all 100 passengers were brought back on the flight.</span></p> <p><span>Unfortunately, inappropriate Wi-Fi names are becoming an occurrence on flights.</span></p> <p><span>In May, a flight from Mexico to London was cancelled after a Wi-Fi network named “Jihadist Cell London 1” was spotted on board.</span></p> <p><span>The passenger who noticed the name immediately told the crew and an investigation was launched.</span></p> <p><span>Last year, a Qantas flight that was about to take off from Melbourne to Perth was delayed for two hours after a passenger noticed a Wi-Fi network named “Mobile Detonation Device”.</span></p> <p><span>In 2014, a passenger on an American Airlines flight at Los Angeles airport noticed a Wi-Fi network called “Al-Quida Free Terror Network”.</span></p> <p><span>The flight was delayed as authorities investigated the incident and then it was further delayed for even longer because the crew needed to be replaced as their hours were up. </span></p>

International Travel

Placeholder Content Image

The surprising things in your home that could be wrecking your Wi-Fi connection

<p>We’ve all become so addicted to Wi-Fi these days, it’s gotten to the point where a slow internet connection is almost completely unbearable. And while you can fork over a mint to get your hands on the “best” plan, there are many things you’re doing around the house day-to-day that could be dramatically slowing your connection.</p> <p>And it all comes down to the placement of your router.</p> <p>Something as simple as placing your router near an electronic device like a TV, fish tank or event Christmas tree lights can result in a dramatic drop in speeds.</p> <p>The reason this is the case is that every day electrical objects all emit signals that can interfere with that of your Wi-Fi connection, restricting your potential speed.</p> <p>“We are increasingly reliant on the internet for so many aspects of our lives and it's therefore so important that we can trust in the reliability of our service,” said Meredith Sharples, director at Post Office Telecoms.</p> <p>“However, the public told us they suffer from a slow internet connection, have had their connection drop at random times and experience a poor Wi-Fi connection in certain rooms.</p> <p>“We also learned that many are not aware of the simple steps they can take to ensure their home is optimised to receive the best broadband connections possible.”</p> <p><strong>Ways to increase your Wi-Fi speed:</strong></p> <ul> <li>Place router away from other electronic devices</li> <li>Ensure the Wi-Fi router is plugged into your master socket</li> <li>Protect your router with a password</li> <li>Use the latest version of your internet browser</li> </ul> <p>Are you happy with your Wi-Fi connection?</p>

Technology

Placeholder Content Image

Security flaw in Wi-Fi leaves millions at risk

<p>The US government and security researchers worldwide have issued warnings of a newly discovered flaw in a widely used Wi-Fi encryption protocol.</p> <p>The US government’s Computer Emergency Response Team (CERT) issued a warning saying the security flaw can open the door to hackers seeking to eavesdrop or hijack devices using wireless networks.</p> <p>“Exploitation of these vulnerabilities could allow an attacker to take control of an affected system," said CERT.</p> <p>The agency’s warning follows research by computer scientists at the Belgian university KU Leuven, who named the security flaw KRACK, for Key Reinstallation Attack.</p> <p>Ars Technica has reported that the discovery was a closely guarded secret for weeks in order to allow Wi-Fi systems to develop security measures.</p> <p>The Wi-Fi encryption protocol with the security flaw, WPA2, allows hackers “to read information that was previously assumed to be safely encrypted," said a blog post by KU Leuven researcher Mathy Vanhoef.</p> <p>“This can be abused to steal sensitive information such as credit card numbers, passwords, chat messages, emails, photos, and so on. The attack works against all modern protected Wi-Fi networks.”</p> <p>Mathy also said the flaw may allow an attacker “to inject ransomware or other malware into websites.”</p> <p>The Belgian researchers said in a research paper that devices on all operating systems may be vulnerable to KRACK, including 41 per cent of Android devices.</p> <p><strong>The risk</strong></p> <p>According to researchers, the flaw is dangerous due to the difficulty in patching millions of wireless systems.</p> <p>“Wow. Everyone needs to be afraid," said Rob Graham of Errata Security in a blog post.</p> <p>“It means in practice, attackers can decrypt a lot of Wi-Fi traffic, with varying levels of difficulty, depending on your precise network setup.”</p> <p>Researchers at Finland-based security firm F-Secure said the discovery of the flaw confirms longstanding concerns about Wi-Fi systems’ vulnerability.</p> <p>“The worst part of it is that it’s an issue with Wi-Fi protocols, which means it affects practically every single person in the world that uses Wi-Fi networks," F-Secure said in a statement.</p> <p>F-Secure researchers said Wi-Fi users can minimise the risks by using virtual private networks and by updating devices including routers.</p> <p>The Wi-Fi Alliance, an industry group who sets standards for wireless connections, said computer users should not panic.</p> <p>“There is no evidence that the vulnerability has been exploited maliciously, and Wi-Fi Alliance has taken immediate steps to ensure users can continue to count on Wi-Fi to deliver strong security protections,” the group said in a statement.</p> <p>“Wi-Fi Alliance now requires testing for this vulnerability within our global certification lab network and has provided a vulnerability detection tool for use by any Wi-Fi Alliance member."</p> <p>On October 10, Microsoft released a patch to protect users of Windows devices.</p> <p>“Customers who have Windows Update enabled and applied the security updates, are protected automatically," Microsoft said.</p> <p>A Google spokesman said, “We’re aware of the issue, and we will be patching any affected devices in the coming weeks.”</p>

Technology

Placeholder Content Image

How to find Wi-Fi using Facebook

<p><em><strong>Lisa Du is director of <span style="text-decoration: underline;"><a href="https://readytechgo.com.au/" target="_blank">ReadyTechGo</a></span>, a service that helps people gain the confidence and skills to embrace modern technology.</strong></em></p> <p>Wi-Fi is a necessity when travelling because it allows you to communicate at little or no cost. When you're away from home, and in need of Wi-Fi, Facebook can now help you find it! <br /> <br /><strong> How does it work?</strong><br /> <br /> The Facebook app on your device can help you locate available hotspots at nearby businesses. <br /> <br /> The feature works by using information that businesses have added to their Facebook pages. It's handy, but won't show you all available Wi-Fi hotspots (there’s other apps for that).</p> <p><strong>How do I use the feature?</strong></p> <p>1. On your device, Tap on the <strong>Facebook</strong> App to open it (If you don't have the Facebook app, you will need to download the app from Apple App Store or Google Play Store)<br /> <br /> 2. Click on the <strong>More</strong> tab (looks like three lines in top right-hand corner)<br /> <br /> 3. Under the <strong>Apps</strong> section, tap See All</p> <p><img width="281" height="" src="https://gallery.mailchimp.com/e785dd9ba906ed79fad48bd7e/images/759c8fc2-fcb0-4aa1-a887-6a71b4ad72e9.png" class="mcnImage" style="max-width: 1080px; line-height: 100%; outline: none; vertical-align: bottom; height: 500px; display: block; margin-left: auto; margin-right: auto;"/></p> <p>4. Scroll down, and tap on Find Wi-Fi</p> <p><img width="278" height="" src="https://gallery.mailchimp.com/e785dd9ba906ed79fad48bd7e/images/a14ad3c9-b38c-46ef-aec1-18e82913ced9.png" class="mcnImage" style="max-width: 1080px; line-height: 100%; outline: none; vertical-align: bottom; height: 493px; display: block; margin-left: auto; margin-right: auto;"/></p> <p>5. Tap on <strong>Enable Find Wi-Fi </strong></p> <p><img width="240" height="" src="https://gallery.mailchimp.com/e785dd9ba906ed79fad48bd7e/images/f06157b6-3a45-4933-aa4a-42d932618258.png" class="mcnImage" style="max-width: 1080px; line-height: 100%; outline: none; vertical-align: bottom; height: 426px; display: block; margin-left: auto; margin-right: auto;"/></p> <p>6. A list of businesses will appear </p> <p>OR you can tap on <strong>Map</strong> to see a map of Wi-Fi hotspots</p> <p style="text-align: center;"><img width="225" height="" src="https://gallery.mailchimp.com/e785dd9ba906ed79fad48bd7e/images/392f5b0d-6951-48bd-ab97-b6c7a9fe0e98.png" class="mcnImage" style="max-width: 1080px; line-height: 100%; outline: none; vertical-align: bottom; height: 399px;"/></p> <p>You can tap on a business name, and Facebook will provide information about the business (via their Facebook page), or give you directions to this Wi-Fi location.<br /> <br /> Please note that you do need an internet connection to use this feature, then you can use Wi-Fi when you get to the location! </p>

Technology

Placeholder Content Image

Company demonstrates the shocking danger of public Wi-Fi networks

<p>There’s nothing we love more than finding a free, open Wi-Fi hotspot when we’re waiting around at the airport or shopping centre, but one company has proven just how dangerous these public networks can be.</p> <p>Purple, a Manchester-based Wi-Fi hotspot company, ran a little experiment this week, including a “Community Service Clause” in its terms of service agreement, binding 22,000 people into a signed contract agreeing to complete 1,000 of menial labour simply to gain access to the “free” network.</p> <p>The chores unwittingly agreed to by the Wi-Fi users included:</p> <ul> <li>Removing animal waste from local parks</li> <li>Giving hugs to stray cats and dogs</li> <li>Manually clearing sewer blockages</li> <li>Cleaning portable toilets at local events</li> <li>Removing chewing gum from the streets</li> <li>Painting snail shells – just to make them a little prettier!</li> </ul> <p>It’s not entirely clear if the company would be legally allowed to enforce the clause, but Purple explained it wouldn’t try – their aim was only to encourage people to read the terms of service before logging in to open Wi-Fi networks. After all, you never know what you might have just signed up to.</p> <p>There was even a prize on offer for anyone who spotted the sneaky added clause – but only one person (0.000045 per cent of the total number of users) managed to do it.</p> <p>“Wi-Fi users need to read terms when they sign up to access a network,” Purple CEO Gavin Wheeldon <a rel="noopener" href="https://purple.ai/purple-community-service/" target="_blank"><strong><span style="text-decoration: underline;">said in a statement</span></strong></a>. “What are they agreeing to, how much data are they sharing, and what license are they giving to providers? Our experiment shows it’s all too easy to tick a box and consent to something unfair.”</p>

Travel Tips

Placeholder Content Image

Clever map shows Wi-Fi passwords from airports around the world

<p>A travel blogger has come up with a solution to one of the most common travel problems – hundreds of Wi-Fi hotspots and no password. Computer security engineer Anil Polat has devised an interactive map to put an end to outrageous airport Wi-Fi fees once and for all.</p> <p>Polat regularly updates the map, which currently has passwords from dozens of airports around the world and offers users full instructions on how to log in to the network and where to get the best connection.</p> <p><iframe src="https://www.google.com/maps/d/embed?mid=1Z1dI8hoBZSJNWFx2xr_MMxSxSxY&amp;hl=en_US" width="640" height="480"></iframe></p> <p>So forget those pricey roaming charges, just use this map the next time you take off and you’ll have full internet access during those pesky stopovers.</p> <p><strong>Related links:</strong></p> <p><a href="/travel/international/2016/10/best-or-worst-time-to-visit-europe/"><span style="text-decoration: underline;"><em><strong>How safe it is to travel to Europe</strong></em></span></a></p> <p><a href="/travel/international/2016/10/why-i-will-never-use-a-money-belt-again/"><span style="text-decoration: underline;"><em><strong>Why I’ll never use a money belt again</strong></em></span></a></p> <p><a href="/travel/international/2016/10/10-foods-every-traveller-has-to-try/"><em><span style="text-decoration: underline;"><strong>10 foods every traveller has to try (at least once)</strong></span></em></a></p>

International Travel

Placeholder Content Image

How to secure your Wi-Fi network from hackers

<p>An insecure Wi-Fi network can result in more than just slower internet and a burnt-through data cap. You could lose access yourself or even let private information get into the wrong hands. As more devices in our home become Wi-Fi connected - from your home security to your lightbulbs - making sure your Wi-Fi is secure is more necessary than ever. Here's how.</p> <p><strong>Change passwords</strong></p> <p>This seems obvious, but stick with me. While you might have set a pretty good password for your Wi-Fi network when you set it up – what with capital letters and numbers and everything - the password to log in to your actual router might still be the default.  This means anyone already on your network can easily change the actual Wi-Fi password themselves.</p> <p>(There's also the possibility that your Wi-Fi password is still the one written on the back of your router. You should definitely change that.)</p> <p>To change either of these passwords, you'll want to log in to your router. (Your router is that box with flicking lights that gives you internet. It probably has some antennas.)</p> <p>Open a web browser (Chrome, Safari, Internet Explorer - whatever you use) on a device that's connected to your Wi-Fi and type "192.168.0.1". This should open a login page. (If it doesn't try "192.168.1.1".)</p> <p>Logging in here, disturbingly, should be pretty easy. Check your router's make and model here or on Google. It's likely "admin" and "admin" or "admin" and "password".</p> <p>Once you've logged in you should see your router's settings page. Each one of these is different, but changing the password for both the router and the Wi-Fi network itself should be relatively easy. If not, Google is your friend. Remember to go long and to add numbers. If you're worried about forgetting it, try a long sentence of song lyrics along with a few numbers - easy to remember, extremely hard for a computer to crack.</p> <p><strong>Change the name of your network</strong></p> <p>If your Wi-Fi network already has some dumb joke name, skip this section. If it's called NETGEAR 5345 or something like that, time to get one of those dumb joke names. You can do this, again, by logging into your router. Look for an option to change the "SSID".</p> <p>Why? Because for potential hackers, knowing the type of router or connection you have makes the job a lot easier. Getting rid of the default name makes this a bit harder for them.</p> <p><strong>Encrypt your network</strong></p> <p>Your router is likely already encrypted with WAP encryption, which is fairly standard, but is also quite easy to crack. Luckily, most newer routers should offer "WPA2" encryption - don't worry about what it means - which is much stronger. However, it also will lock out any device from prior to 2006, so if you've got some ancient laptop somewhere, be wary.</p> <p>To do this, you're going to want to - once again - log in to your router. (See why it's so important to make sure your router is password protected too?) Encryption options should be under security settings.</p> <p><strong>Restrict your Wi-Fi to certain devices</strong></p> <p>This is something of a nuclear option, and can be extremely inconvenient. Basically, instead of allowing any device with the right password onto your network, it will restrict the network to only allow access for devices on a list. To do this, assemble a list of all the MAC addresses of every device you own, then input them into their router. MAC addresses are basically unique IDs for every device that has Wi-Fi - Google how to find them on each of your smartphones, laptops, tablets, and consoles.</p> <p>Once you've got that list, log back in to your router and into the security settings again.</p> <p>Have you ever taken measures to secure your Wi-Fi? Do you think you’re going to take them now? Share your thoughts in the comments.</p> <p><em>First appeared on <a href="http://Stuff.co.nz" target="_blank"><strong><span style="text-decoration: underline;">Stuff.co.nz</span></strong></a>.</em></p> <p><strong>Related links:</strong></p> <p><a href="/entertainment/technology/2016/06/14-tricks-that-will-change-how-you-use-your-ipad/"><strong><em><span style="text-decoration: underline;">14 tricks that will change how you use your iPad</span></em></strong></a></p> <p><a href="/entertainment/technology/2016/06/how-to-keep-your-facebook-messages-private/"><em><span style="text-decoration: underline;"><strong>How to keep your Facebook messages private</strong></span></em></a></p> <p><a href="/entertainment/technology/2016/05/hints-for-using-gmail/"><em><strong><span style="text-decoration: underline;">5 hints for using Gmail</span></strong></em></a></p>

Technology

Placeholder Content Image

5 rules to follow when using free Wi-Fi overseas

<p>Whether you’re looking for restaurant recommendations or trying to figure out where your hotel is, free Wi-Fi can be an absolute godsend when you’re travelling.</p> <p>But this convenience also comes with a degree of risk.</p> <p>Public Wi-Fi networks are notorious for security flaws that put personal data at risk, if you haven’t taken the necessary precautions. Here are five rules for connecting to Wi-Fi overseas. Follow these rules and you’ll be able to get online safely and securely.</p> <p><strong>1. Customise your phone’s security setup</strong></p> <p>We forget that our portable devices are just as vulnerable to malicious software as our computers, so consider purchasing security software for your phone before travelling.</p> <p><strong>2. Use strong, long passwords</strong></p> <p>A lot goes into a password, but it pays to make them complicated. Longer, more-complicated passwords that are unique to different accounts are much more difficult to hack and provide another level of protection when using your devices.</p> <p><strong>3. Make sure the network is legitimate</strong></p> <p>This is one of the most common ways hackers trick travellers. Before connecting to a network at a hotel of café, double check with the staff or manager the name of the network to make sure you’re not connecting to a dummy, insecure alternative.</p> <p><strong>4. Consider using a virtual private network (VPN)</strong></p> <p>Even if the network you’re using is password-protected, there’s still a chance your communication could be intercepted. For a subscription VPNs basically create a network-within-a-network just for you that ensures all traffic is through a private connection.</p> <p><strong>5. Consider buying a data plan</strong></p> <p>Most of the time your mobile network will be secure, so if you are after peace of mind and you don’t mind forking out for a little bit extra as you’re travelling, consider investing in a data plan to ensure you have absolute peace of mind when logging on. </p> <p>Have you accessed a Wi-Fi network when travelling overseas and been scammed? Do you know someone who has? Let us know in the comments below.</p> <p><strong>Related links:</strong></p> <p><a href="/travel/travel-tips/2016/07/6-golden-rules-to-keep-your-smartphone-safe-while-travelling/"><span style="text-decoration: underline;"><em><strong>6 golden rules to keep your smartphone safe while travelling</strong></em></span></a></p> <p><a href="/travel/travel-tips/2016/07/the-real-reason-your-luggage-is-lost-in-transit/"><span style="text-decoration: underline;"><em><strong>The real reason your luggage is lost in transit</strong></em></span></a></p> <p><a href="/travel/travel-tips/2016/06/5-international-cities-you-should-never-visit-alone/"><span style="text-decoration: underline;"><em><strong>5 international cities you should never visit alone</strong></em></span></a></p>

Travel Tips