Congress has cut federal funding for public media — a $3.4 million loss for LAist. We count on readers like you to protect our nonprofit newsroom. Become a monthly member and sustain local journalism.
This archival content was written, edited, and published prior to LAist's acquisition by its current owner, Southern California Public Radio ("SCPR"). Content, such as language choice and subject matter, in archival articles therefore may not align with SCPR's current editorial standards. To learn more about those standards and why we make this distinction, please click here.
Watch out for the 'Man In the Middle' and the 'Evil Twin' -- Wireless Security and You

If the title of this post confuses you, don't be too worried because these terms probably confuse, or completely escape the notice, of most people. So, what then do they mean? Well, they refer to different types of cyber attacks on you and your computer that take place every day here in Los Angeles. Attackers use these types of attacks, and others, to gain access to your computer and your data with sometimes unfortunate results.
According to a recent LA Times article, these cyber attacks are all part of a plan by hackers to exploit unsuspecting computer users using fake wireless networks set up for the sole purpose of obtaining users valuable data. Sadly, according to the article and my experience with this problem, the process of gaining access to someone's computer and their personal data is often relatively simple.
As most computers these days are set up to search for wireless networks automatically, its pretty easy for would-be hackers to set up wireless networks with inviting names like "Free Wireless" or a well-known commercial name like "T-Mobile" and once your computer finds the network and you sign onto the supposedly free or known-safe wireless network, that's when the hackers attempt to steal your data. This is what's known as the "evil twin."
Another way a potential hacker can exploit your computer is by using a method known as the "man in the middle." In this scenario, the hacker gets you to connect to his fake network and then runs your connection through his computer and then out to the legitimate internet. Doing this allows the hacker to grab whatever bits of data you send out to the internet including credit card numbers, passwords and other bits of information usually kept secret.
Yet another problem is the sheer number of people using wireless networks at home these days. Unfortunately, most people simply take their wireless routers out of the box, connect them and then connect to the default wireless network named "linksys" or "d-link" (two of the most popular wireless equipment makers). Because of this, its far easier for potential intruders to get your computer to connect to their fake networks.
All they have to do is set up their trap and use a network name like "linksys" or "d-link" and in many case, your computer will connect to that network automatically -- without you even having to agree or click any buttons. Unfortunately, the computer doesn't know the difference between your network at home named "linksys" and the fake network set up by the hacker trying to get into your computer. All its looking for is the name and if the name matches, it will connect.
So what can you do to protect yourself? First of all, configure your wireless network at home properly and don't just use the default settings out of the box. Pick an obscure network name and use a complex password. That way your computer won't try to automatically connect to any network out there with the same name. Also, be more aware of public and seemingly free wireless networks, especially in high-traffic areas like coffee houses and airports -- two frequent places for would-be hackers to find exploitable computers.
If you're a Windows user, make sure you keep your computer updated with the latest patches and security updates and also make sure to have up-to-date anti-virus software as well. And, be sure to set up a complex password on your computer. In many cases people start using their computers without putting a password on them at all. Don't do it and don't choose something like 'password' as that wail be easy for an attacker to guess.
Choose a password far more complicated but easy for you to remember. Use a combination of letters, numbers and symbols for even greater security. Lastly, even though it sometimes can cause other issues, turning on the Windows Firewall can also help prevent intruders from getting into your computer. If you happen to use a Macintosh, your computer is less vulnerable to attack but that doesn't mean you shouldn't take security seriously.
The point of all these security precautions is to make your computer as unattractive and difficult as possible for a would-be attacker to exploit. If it becomes too hard for them or too time consuming to access your computer and your information, they may simply move on to another computer that is less protected than yours. Plus, if they can't get access to your computer in the first place because you took proper precautions and didn't connect to that suspiciously free wireless network, that's even better.
As Editor-in-Chief of our newsroom, I’m extremely proud of the work our top-notch journalists are doing here at LAist. We’re doing more hard-hitting watchdog journalism than ever before — powerful reporting on the economy, elections, climate and the homelessness crisis that is making a difference in your lives. At the same time, it’s never been more difficult to maintain a paywall-free, independent news source that informs, inspires, and engages everyone.
Simply put, we cannot do this essential work without your help. Federal funding for public media has been clawed back by Congress and that means LAist has lost $3.4 million in federal funding over the next two years. So we’re asking for your help. LAist has been there for you and we’re asking you to be here for us.
We rely on donations from readers like you to stay independent, which keeps our nonprofit newsroom strong and accountable to you.
No matter where you stand on the political spectrum, press freedom is at the core of keeping our nation free and fair. And as the landscape of free press changes, LAist will remain a voice you know and trust, but the amount of reader support we receive will help determine how strong of a newsroom we are going forward to cover the important news from our community.
Please take action today to support your trusted source for local news with a donation that makes sense for your budget.
Thank you for your generous support and believing in independent news.

-
After rising for years, the number of residential installations in the city of Los Angeles began to drop in 2023. The city isn’t subject to recent changes in state incentives, but other factors may be contributing to the decline.
-
The L.A. City Council approved the venue change Wednesday, which organizers say will save $12 million in infrastructure costs.
-
Taxes on the sale of some newer apartment buildings would be lowered under a plan by Sacramento lawmakers to partially rein in city Measure ULA.
-
The union representing the restaurant's workers announced Tuesday that The Pantry will welcome back patrons after suddenly shutting down six months ago.
-
If approved, the more than 62-acre project would include 50 housing lots and a marina less than a mile from Jackie and Shadow's famous nest overlooking the lake.
-
The U.S. Supreme Court lifted limits on immigration sweeps in Southern California, overturning a lower court ruling that prohibited agents from stopping people based on their appearance.