Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


12:00 AM
Dark Reading
Dark Reading
Products and Releases

New Windows App to Detect WiFi Security

Easy-to-Use, Free App is Available Today for Windows 8 PCs and Surface Tablets

NEW YORK, NY (Marketwired – July 23, 2014)PRIVATE WiFi today unveiled a new free app — WiFi Dashboard — for Windows 8 personal computers and Surface tablets, which will alert users when they are using unsecure or unencrypted WiFi. Many hotspots — whether people access them in a hotel, coffee shop, park, or are using an open connection at home — are unsecure. WiFi Dashboard shows the connectivity status of the network and provides information about the network name, IP address, and location. This new app is the first of its kind for Windows 8 to alert people when they are connected on an unsecure connection, so that they can take immediate steps to protect their identity and personal information.

According to a 2014 Nielsen study, 66 percent of U.S. adults said they have used public WiFi. Thirty-nine percent of this group said that they have accessed or transmitted sensitive information while using public WiFi, which increases their chances of getting hacked or having their identity stolen. WiFi Dashboard for Windows 8 decreases the chance of this happening. It keeps users informed and makes unsecure WiFi connections easily and immediately visible.

 “We stand for empowering users to protect themselves online and we believe that information is power. That’s why this app is so exciting for us — it’s very intuitive and simple to see if a connection is secure or not. We make it free for users so that they can make their own decisions, whether it’s waiting to conduct a sensitive banking transaction later or installing a personal virtual private network (VPN). A VPN would enable them to go about their business as usual, immediately and without worry,” said PRIVATE WiFi CEO Kent Lawson.

WiFi Dashboard offers an easy-to-use interface complete with color-coded live tiles, so that people know exactly how secure their connection is — wherever they are working or surfing the Internet. The colors include:

Red: Insecure (no encryption or WEP)

Blue:  Secure (WPA/WPA2, wired, dial-up)

Green: Encrypted (VPN)

Black: No Internet connection

Users who download the app are also eligible for a free 10 day trial of PRIVATE WiFi’s VPN, which offers 128-bit SSL encryption technology — the same technology trusted by banks and government agencies — so that users’ data will stay secure and protected. The VPN utilizes encrypted pathways between devices and its servers so that users will be invisible to hackers.

For detailed information about the WiFi Dashboard, visit: http://apps.microsoft.com/windows/en-us/app/edebd8f3-5aaa-466b-82c1-ac46aacc086e


Private Communications Corporation is a security technology company that protects personal data and information on the Internet. PRIVATE WiFi, the company's flagship software offering, encrypts all computer data across unencrypted WiFi networks, enhancing online privacy for those without access to virtual private networks. PRIVATE WiFi was founded by software entrepreneur Kent Lawson, who is concerned about the growing number of privacy issues on the Internet.

Private Communications Corporation is headquartered in Sherman, CT. For more information, visit us at http://www.privateWi-Fi.com and for articles and other online privacy resources, please visit www.private-i.com. You can also connect with them on Facebook at http://www.facebook.com/privateWi-Fi

PRIVATE WiFi protects your identity by making your sensitive information invisible on any public WiFi network. For more information, please contact us at 1-888-525-3078.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
I 'Hacked' My Accounts Using My Mobile Number: Here's What I Learned
Nicole Sette, Director in the Cyber Risk practice of Kroll, a division of Duff & Phelps,  11/19/2019
DevSecOps: The Answer to the Cloud Security Skills Gap
Lamont Orange, Chief Information Security Officer at Netskope,  11/15/2019
Attackers' Costs Increasing as Businesses Focus on Security
Robert Lemos, Contributing Writer,  11/15/2019
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-11-22
nsGreen.dll in Naver Vaccine 2.1.4 allows remote attackers to overwrite arbitary files via directory traversal sequences in a filename within nsz archive.
PUBLISHED: 2019-11-22
A cross-site request forgery (CSRF) vulnerability in the Activity module 6.x-1.x for Drupal.
PUBLISHED: 2019-11-21
An issue was discovered in Symfony before 4.2.12 and 4.3.x before 4.3.8. The VarExport component incorrectly escapes strings, allowing some specially crafted ones to escalate to execution of arbitrary PHP code. This is related to symfony/var-exporter.
PUBLISHED: 2019-11-21
An issue was discovered in Symfony 2.8.0 through 2.8.50, 3.4.0 through 3.4.34, 4.2.0 through 4.2.11, and 4.3.0 through 4.3.7. The UriSigner was subject to timing attacks. This is related to symfony/http-kernel.
PUBLISHED: 2019-11-21
An issue was discovered in Symfony 2.8.0 through 2.8.50, 3.4.0 through 3.4.34, 4.2.0 through 4.2.11, and 4.3.0 through 4.3.7. If an application passes unvalidated user input as the file for which MIME type validation should occur, then arbitrary arguments are passed to the underlying file command. T...