Solved

Verizon Wireless Broadband safer than WiFi?

Posted on 2007-04-02
3
1,204 Views
Last Modified: 2010-08-05
1) Can the latte drinking hackers eavesdrop on a Verizon Wireless Broadband connection like they can on an open WiFi connection at a coffee shop?

2) Do I need to bother with one of those $7/month public VPN services if I'm on Verizon Wireless Broadband?

Thanks in advance,
Mike
0
Comment
Question by:mike2401
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 3

Expert Comment

by:TheTechGuysNYC
ID: 18841163
1) Yes, if there is no encryption and they are willing. A coffee shop's connection is wide open, which allows anyone to connect. Home networks can be encrypted if there is a desire to do so.

2) Nope, just encrypt the network. Unless of course you are FBI or a CEO of some fortune 500 with much sensitive information...

Then you might want to think about encrypting your entire hd, etc. Let me know if this is the case...
0
 

Author Comment

by:mike2401
ID: 18860034
I'm more concerned about knowing if I can skip VPN if I use a pcmcia wireless laptop card for broadband.

I'm already convinced I need VPN in a open hotspot wifi environment.

Thanks,
Mike
0
 
LVL 1

Accepted Solution

by:
ahenson earned 500 total points
ID: 18986384
Sniffing your VZW cellular data is like sniffing a cellphone conversation.  It's possible, but "leet hackers" don't have the (insert large dollar figure here) gear and knowledge to do it - it's nothing like capturing wifi traffic.

I wouldn't send any classified government secrets over it (nor would I send classified secrets over my home DSL) - but it's suitably secure for mail/www/etc.

Spend the $7/month on a latte instead.
0

Featured Post

Put Machine Learning to Work--Protect Your Clients

Machine learning means Smarter Cybersecurity™ Solutions.
As technology continues to advance, managing and analyzing massive data sets just can’t be accomplished by humans alone. It requires huge amounts of memory and storage, as well as the high-speed power of the cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Read about achieving the basic levels of HRIS security in the workplace.
DECT technology has become a popular standard for wireless voice communication. DECT devices are not likely to be affected by other electronic devices and signals because they operate in a separate frequency-band.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…

717 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question