This article originally appeared in TidBITS on 2015-03-02 at 11:24 a.m.
The permanent URL for this article is: http://tidbits.com/article/15457
Include images: Off

Chapter 6 of “Take Control of Security for Mac Users” Available

by Adam C. Engst

Many people dismiss network eavesdropping as a security risk under the assumption that their network traffic isn’t sufficiently interesting, and besides, who would sit around in a coffee shop just to sniff random Wi-Fi packets? Alas, the reality is that most such monitoring is done by software robots — possibly even in the form of malware running in the background of hijacked PCs — slurping up everything and winnowing out the interesting bits, which could include email addresses to spam, passwords to use for identity theft, and credit card numbers to resell.

That’s where Joe Kissell focuses in this week’s installment from “Take Control of Security for Mac Users.” In Chapter 6, “Improve Your Network Security [1],” he identifies the primary avenues of attack, recommends WPA encryption for Wi-Fi networks you control, and encourages the use of a virtual private network (VPN) for use on public Wi-Fi networks or in any situation where it’s essential that your network traffic remain private.

If you’re just getting started with “Take Control of Security for Mac Users,” the first two chapticles are available to everyone, but subsequent ones are limited to TidBITS members [2]. Those who join the TidBITS membership program receive other benefits too, but what’s most important is that TidBITS members have kept TidBITS afloat the last few years — your support truly is necessary. If you’re already a TidBITS member, log in to the TidBITS site using the email address from which you joined to read and comment on these chapters.

The full ebook of “Take Control of Security for Mac Users” will be available for purchase by everyone in PDF, EPUB, and Mobipocket (Kindle) formats once it’s complete.

[1]: http://tidbits.com/article/15458
[2]: http://tidbits.com/member_benefits.html
[3]: http://tidbits.com/article/15376
[4]: http://tidbits.com/article/15377
[5]: http://tidbits.com/article/15407
[6]: http://tidbits.com/article/15421
[7]: http://tidbits.com/article/15439
[8]: http://tidbits.com/article/15458