Wi-Fi

How safe is surfing on 4G vs. WiFi?


Authored by a Symantec employee

 

You’re probably familiar with 3G, 4G, and Wi-Fi hotspots. In today’s increasingly connectedmobile world, there are a variety of ways to get and stay connected to theInternet, but what’s really the safest way?

Truth be told, nothing is 100% safe. However, there are ways that you can beefup your own security to get as close to that 100% as possible. It begins with understanding what these technologies are, and the risks that come along with them.

How Do Mobile Devices Connect to the Internet?

Let’s break down the three different ways your mobile device can connect tothe Internet, and how these connections work:

4G Connections

4G-enabled devices connect to the Internet though their provider’s cellularconnection. Instead of receiving a signal from an Internet Service Provider asthe device would at home or work, it receives data from the cellular company in the same way it receives a mobile phone connection. 4G allows users to access the Internet anywhere they receive signal. Fortunately, data being sent via 4G is encrypted, making 4G safer than public Wi-Fi.

Private Wi-Fi Connections

These are the types of networks you would find in your office or at home. Private Wi-Fi connections, when properly set up, allow password-protected access and encryption to the data that is being sent and received.

Public Wi-Fi Hotspots

Public Wi-Fi hotspots are found in public places such as airports, coffee shops, malls, restaurants, and hotels — virtually anywhere, really. Public Wi-Fi is the least safe way to connect to the Internet, and it’s really a wildcard. There are so many unknown variables, but the main problem with using a public network is being unable to determine if it is 100% safe. You really can’t know if it’s safe or not unless you have a way to secure your connection, such as with a virtual private network, or VPN.

Can 4G Be Hacked?

At the risk of sounding like a broken record, nothing connected to the Internet is 100% invincible to cybercriminals all the time. However, when it comes to 4G, hacking seems to still be in the proof-of-concept stage. Proof-of-concepts happen when white hat hackers (the good guys, who are usually researchers) look for ways they can compromise a system. There have been a few successful cases of people hacking into 4G via man-in-the-middle attacks (MITM).

A MITM attack is like eavesdropping. Attackers can place themselves either between two unsuspecting victims, or between the user and the app, or even between two machines, and “listen in” on the transmissions being sent back and forth.

So, for now, the short answer is yes, 4G can be compromised. However, it is much more difficult to hack than public Wi-Fi, which attackers mainly have their sights set on.

What’s the Safest Solution?

Since there are a few options in the ways you connect to the Internet via your mobile device, there is hope. When it comes to public Wi-Fi, there are more opportunities for attackers to exploit vulnerabilities via your connection over Wi-Fi than over 4G. As far as the security of these connections, here’s how they rank from most secure to least secure:

  1. Using a VPN over a cellular network or using a VPN over Wi-Fi
  2. Cellular only
  3. Wi-Fi only

So, really, the safest way to ensure your security while on the go is to use a multi-layered approach. The use of anti-malware protection, firewalls, VPNs, and online common sense are also vital.

Norton Secure VPN is a VPN that encrypts all the information sent and received by your mobile device while you’re on public Wi-Fi, making your public connection private.

Device security, Dark Web Monitoring powered by LifeLock and a VPN–up to 60% off*

NEW Norton 360 has multiple layers of protection including a VPN for online privacy.


Editorial note: Our articles provide educational information for you. Norton LifeLock offerings may not cover or protect against every type of crime, fraud, or threat we write about. Our goal is to increase awareness about cyber safety. Please review complete Terms during enrollment or setup. Remember that no one can prevent all identity theft or cybercrime, and that LifeLock does not monitor all transactions at all businesses.

Copyright © 2019 NortonLifeLock Inc. All rights reserved. NortonLifeLock, the NortonLifeLock Logo, the Checkmark Logo, Norton, LifeLock, and the LockMan Logo are trademarks or registered trademarks of NortonLifeLock Inc. or its affiliates in the United States and other countries. Firefox is a trademark of Mozilla Foundation. Android, Google Chrome, Google Play and the Google Play logo are trademarks of Google, LLC. Mac, iPhone, iPad, Apple and the Apple logo are trademarks of Apple Inc., registered in the U.S. and other countries. App Store is a service mark of Apple Inc. Alexa and all related logos are trademarks of Amazon.com, Inc. or its affiliates. Microsoft and the Window logo are trademarks of Microsoft Corporation in the U.S. and other countries. The Android robot is reproduced or modified from work created and shared by Google and used according to terms described in the Creative Commons 3.0 Attribution License. Other names may be trademarks of their respective owners.

No one can prevent all identity theft or cybercrime.  Not all products, services and features are available on all devices or operating systems. System requirement information on norton.com.

*Important Subscription, Pricing and Offer Details:

  • The price quoted today may include an introductory offer. After that, your membership will automatically renew and be billed at the applicable monthly or annual renewal price found here.
  • You can cancel your subscription at my.norton.com or by contacting Member Services & Support. For more details, please visit the Refund Policy.
  • Your subscription may include product, service and /or protection updates and features may be added, modified or removed subject to the acceptance of the Customer Agreement.

The number of supported devices allowed under your plan are primarily for personal or household use only. Not for commercial use. If you have issues adding a device, please contact Member Services & Support.

§ Dark Web Monitoring in Norton 360 plans defaults to monitor your email address only. Please login to the portal to review if you can add additional information for monitoring purposes.