Wi-Fi security: FBI warns of risks of using wireless hotel networks
Tech Republic Security
OCTOBER 6, 2020
Wi-Fi networks in hotels typically favor guest convenience over strong security practices, says the FBI.
This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Tech Republic Security
OCTOBER 27, 2020
While hotel Wi-Fi is convenient, security is not the priority, federal government says.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Tech Republic Security
FEBRUARY 21, 2020
Cybercriminals posted the information of more than 10 million customers on a hacker forum a year after the initial attack on a cloud server.
CIO Business Intelligence
JANUARY 16, 2023
Choice Hotels International’s early and big bet on the cloud has allowed it to glean the many benefits of its digital transformation and devote more energies to a key corporate value — sustainability, its CIO maintains. With Amazon taking care of infrastructure, patching, and security, Choice’s 650-member Scottsdale, Ariz.-based
CIO Business Intelligence
SEPTEMBER 5, 2024
The hotel sector has been undergoing a digital revolution for years, transforming not only the way hotels operate and interact with their customers, but also with the environment, all without harming their bottom lines. Recognition of a digital future Minor’s growth wouldn’t have been possible without a commitment to digitalization.
CIO Business Intelligence
JANUARY 5, 2024
With stints at Procter & Gamble, HPE and DHL, Jaime González-Peralta landed at Radisson Hotel Group four years ago as CIO for EMEA and then became global CIO in April 2020 — a particularly complex moment due to the paralysis that the pandemic inflicted on the world of travel. We made everything new from scratch.
Network World
MAY 3, 2017
Many people are not aware of this, but Wi-Fi hotspots at Starbucks, Barnes & Noble or your local hotel that offers it as a complimentary service are not safe for confidential browsing, performing financial transactions or for viewing your emails. Public Wi-Fi does not offer encryption for individuals using the same password and hotspot.
CTOvision
AUGUST 22, 2014
The inaugural Intelligence and National Security Summit will occur September 18-19 2014 at the Omni Shoreham Hotel in Washington DC. Please take a look at our agenda and see if you do not agree that the Intelligence and National Security Summit will be the preeminent intelligence event in 2014. Conference Co-Chair.
IT Toolbox
APRIL 11, 2023
The Federal Bureau of Investigation has advised users to refrain from using free electric charging plugs at airports, bus stops, shopping centers, and hotels due to the increasing risk of juice-jackin.
Network World
JULY 10, 2016
Omni Hotels & Resorts has reported that point-of-sale systems at some of its properties were hit by malware targeting payment card information. The malware was designed to collect certain payment card information, including cardholder name, credit/debit card number, security code and expiration date,” Omni said.
Tech Republic Security
SEPTEMBER 25, 2019
Magecart 5 is targeting Layer 7 routers used in airports, casinos, hotels, and resorts, and others, to steal credit card data on popular US and Chinese shopping sites.
Network World
JULY 26, 2016
Kimpton Hotels, operator of boutique hotels across the U.S., If confirmed, it would become the latest in a string of successful attacks on hotel chain operators in the last year. As a result, it has hired a computer security firm to investigate whether its systems were compromised and guest data stolen.
CIO Business Intelligence
NOVEMBER 17, 2023
For IHG Hotels and Resorts, the cloud provides just the right accommodation for business success. Moreover, IHG’s cloud backbone enables it to take advantage of emerging SaaS offerings, such as Speakeasy AI conversational chatbots, and deliver its own IHG Voice Cloud AI service to help guests and reception desk clerks at hundreds of hotels.
Network World
SEPTEMBER 1, 2016
In cryptography, the "man in the middle" is usually an attacker -- but when Keezel wants to get between you and the Wi-Fi connection in your hotel or your home, it's for your own good. After a long crowdfunding campaign, the company is getting ready to ship its Wi-Fi security device, also called Keezel, in October.
Computer Weekly
JULY 12, 2016
Hotel group implements centralised security management to proactively protect endpoints and achieve accurate security information
Network World
AUGUST 2, 2016
Millions of point-of-sale systems and hotel room locks can be hacked by temporarily placing a small, inexpensive device several inches away from their card readers. The device, due to be presented Sunday at the DEF CON conference in Las Vegas, is the creation of Weston Hecker, a senior security engineer at Rapid7.
Computer Weekly
AUGUST 16, 2016
Ongoing data breaches through point of sale malware highlights the need for security standards and central support for franchisees in the hotel industry, say security experts
CIO Business Intelligence
AUGUST 13, 2024
In 2023, the cloud, security, and networking service provider announced it will transition its data centers and offices in Michigan to renewable energy sources, Jandron says. Mike Rawson, CIO of citizenM, is also emphasizing green IT as part of the global hotel chain’s IT strategy.
TechSpot
MARCH 21, 2024
Researchers recently disclosed a significant security flaw in Dormakaba's Saflok electronic RFID locks, which are popular with hotels. It could allow a hacker to clone a hotel's keycard to access any room in the building. It is unclear whether hackers are actively exploiting the vulnerability. Read Entire Article
TechSpot
AUGUST 26, 2024
Security researchers at Quarkslab have discovered a backdoor in millions of RFID cards developed by Shanghai Fudan Microelectronics (FMSH). When properly exploited, this backdoor could be used to quickly clone contactless smart cards that regulate access to office buildings and hotel rooms worldwide. Read Entire Article
Network World
MARCH 16, 2017
In truth, cybersecurity professionals need immediate IR help for several reasons: 1. Let’s face it, IR tasks like fetching data, tracking events, or collaborating with colleagues depend upon the organizational, communications, and technical skills of individuals within the security operations team.
Forrester IT
APRIL 16, 2024
With some 30,000 people jammed into a Las Vegas hotel and convention center, expectations were clearly high — and Google gave them plenty to consider. Google conjured a Christmas-in-July atmosphere by scheduling Google Cloud Next April 9-11, some four months earlier than usual to present its AI offerings ASAP and upstage its rivals.
SecureWorld News
NOVEMBER 27, 2024
Check your settings Check the privacy and security settings on web services and apps. Password protect your devices Set your devices to require the use of a PIN, passcode or extra security feature (like a fingerprint or facial scan). Use secure Wi-Fi Do not transmit personal info or make purchases on unsecure or public Wi-Fi networks.
SecureWorld News
SEPTEMBER 12, 2023
MGM Resorts International, a casino and hotel chain, announced that it had suffered a cybersecurity breach on Monday, September 11. As a result of the breach, some customers were unable to make reservations, use their credit cards, or access their hotel rooms.
CTOvision
MARCH 30, 2015
The 10th Cyber & Information Security Research (CISR) Conference, 7-9 April 2015, will be held at the Conference Center, 2nd Floor, Building 5200, Oak Ridge National Laboratory, Oak Ridge, Tennessee. 6:00 PM - 8:00 PM Conference Reception, DoubleTree Hotel. 6:00 PM - 8:30 PM Banquet, DoubleTree Hotel. Reception is free.
Network World
DECEMBER 22, 2016
Virtual private networks (VPNs) encrypt internet connections between two points, to secure them from casual snoopers and hackers. These VPN services are particularly useful when accessing the internet from an untrusted location, such as a hotel, café or coworking space. Here's a look at some of the top VPNs for privacy and security.
CIO Business Intelligence
OCTOBER 1, 2024
Let’s talk about strengthening the four major pillars from an attacker’s perspective, as they form the core of any organization’s security. Source code analysis tools Static application security testing (SAST) is one of the most widely used cybersecurity tools worldwide.
Dataconomy
MARCH 24, 2025
The Cyberspace Administration and Ministry of Public Security also prohibited the tech in hotel rooms, public restrooms, and dressing rooms. Biometric safeguards: Organizations must encrypt facial data, audit security practices, and justify the necessity of using the technology.
CTOvision
JANUARY 10, 2019
More than 5 million unencrypted passport numbers were stolen as part of the Marriott data breach last year, according to an update from the hotel giant. based hotel chain revealed in an online […]. The information accessed in the breach, which was first disclosed on Nov. 30th, also includes approximately 20.3
CTOvision
AUGUST 25, 2016
WASHINGTON-- IDVector , a secure Internet access provider, today emerged from stealth mode with a simple and unobtrusive way to safely and securely access the Internet without fear of data interception or data leaks. There are many steps between you and the online services you use, not all of which are adequately secured.
CIO Business Intelligence
OCTOBER 9, 2023
Truly listening to what the business wants and needs and asking questions while empowering his team to experiment is of paramount importance, agrees Eben Hewitt, CIO of Hyatt Hotels. “My This requires moving faster and more effectively, which Taylor says he constantly preaches to his team, especially in the area of security.
Tech Republic Security
NOVEMBER 29, 2022
Fraudsters are swindling money and digital assets from consumers across industries, with the most hard-hit targets in financial services, retail, gaming, hotel and travel. An account takeover (ATO), in which criminals impersonate legitimate account owners to take control of an account, are on the rise in Asia and across the world.
CTOvision
JANUARY 21, 2014
Travel & Hotel Information: The main NIST campus is located in Gaithersburg, MD approximately 20 miles outside of Washington, DC. Useful travel information, including transportation to NIST as well nearby hotels and restaurants, can be found here: [link]. Analysis CTO Cyber Security Data DoD and IC'
Network World
NOVEMBER 1, 2016
Retailers, hotels and restaurants have all been victimized through the same Achilles' heel that cybercriminals continue to attack: the point-of-sale system, where customers' payment data is routinely processed. Security experts, however, are encouraging a variety of approaches to keep businesses secure from point-of-sale-related intrusions.
CTOvision
SEPTEMBER 14, 2015
14, 2015 /PRNewswire/ -- The National Cyber Security Hall of Fame has released the names of five innovators who will be inducted into the Hall of Fame at its award ceremony on Thursday, October 29 , at the Four Seasons Hotel in Baltimore, Maryland. She is the author of Surveillance or Security? BALTIMORE , Sept.
CIO Business Intelligence
JANUARY 23, 2023
In his role at Ally, a digital financial services company, Muthukrishnan runs a single organization that has responsibility for product definition, designing the user experience, building the product, collecting and securing relevant data, and managing and running the solutions end-to-end. You don’t lead with technology.
Network World
DECEMBER 29, 2016
Karsten Nohl and Nemanja Nikodijevic from Berlin-based consultancy Security Research Labs have spent months investigating the security employed by the Global Distribution Systems (GDSs) that are used by travel agencies, airlines, hotels and car rental companies.
Network World
FEBRUARY 14, 2017
The reason I think we’re at this tipping point is because businesses aren’t referring to these deployments as “IoT” but rather it’s becoming normal operations to connect more and more devices. + Also on Network World: The Internet of Things security threat +.
CIO Business Intelligence
FEBRUARY 6, 2025
And Choice Hotels has used data derived from utility providers to identify sustainability issues like leaking swimming pools. In recent years, IT groups have helped a wide range of organizations improve sustainability initiatives by creating infrastructure that allows them to collect and analyze related data.
CIO Business Intelligence
SEPTEMBER 29, 2022
At a recent CIO New Zealand roundtable event in Auckland, supported by Palo Alto Networks and Vodafone New Zealand, senior technology executives from organisations across Aotearoa discussed the challenge of keeping security front of mind when the workforce is dispersed. The other key aspect is implementing zero trust networking.
CTOvision
FEBRUARY 22, 2017
Ransomware in late 2016 interrupted San Francisco Municipal Transportation Authority (SFMTA) payment machines and in Jan 2017 compromised the electronic key system of an Austrian hotel. In Nov 2016 a DDoS attack against building heating took heating offline in several buildings in Finland.
CIO Business Intelligence
MARCH 25, 2024
The ceremony for the inaugural edition of the CSO30 Awards will take place at the IDC CISO Roundtable on May 15 at Dubai’s Jumeirah Mina A’Salam Hotel, June 4 at Riyadh’s Mövenpick Hotel and June 10 at Doha’s Grand Hyatt Hotel & Villas. Europe, ASEAN, Asia/Pacific, India, and a host of other countries.
Expert insights. Personalized for you.
We have resent the email to
Are you sure you want to cancel your subscriptions?
Let's personalize your content