5 Threats to Watch out for when Using a Public Machine
Recently I wrote an article highlighting steps to take if you provide public computer access to your customers to ensure their security. The news then broke out that hardware key loggers were found at public libraries in Manchester.
Public libraries are an obvious target for people trying to steal confidential information as this is where people without a computer at home will go to conduct online business such as accessing their bank accounts.
The previous article outlined steps to take if you’re providing the service but what if you need to use a public computer service and cannot avoid it, how can you protect yourself then?
First I want to stress that there is no method that is 100% safe; you have to keep in mind that you’re using a public computer so you cannot verify whether it has been tampered with or not. My ideal recommendation would be to avoid using a public computer at all; however, if this is not an option I will illustrate the type of attack you could be subjected to while using such a computer and how best to counter the specific attack.
- Hardware key logger is the first threat as well as the most obvious. These devices installed at the back of computer between the keyboard connector and the computer itself can be small and inconspicuous. They also come in different shapes. If the computer has easy access to the back then peeking to check for such a device might be an option. If it is not easily accessible it is probably not advisable to check for key logger as staff might think you’re trying to tamper with the machine or even installing one yourself. A safer option would be to use an onscreen display keyboard and click the required letters using the mouse when typing in confidential information such as passwords.
- Software Key logger is just like a hardware key logger but is installed as a software program. Unlike the hardware version there is no easy way to know if one is installed or not. The onscreen display keyboard is probably your best chance against this threat; however, there is nothing stopping such software from taking screenshots of every mouse click event of the windows on the screen keyboard application, meaning that there is no 100% effective way to protect yourself against this sort of threat.
- Shoulder surfing is an activity were a person looks over your shoulder to see what you’re typing on the screen. This is an insidious threat especially if you’re using the onscreen display keyboard. The other person will easily be able to tell what you’re typing even if the text is scrambled on screen such as when you’re typing in a password field. Just being aware of your surroundings is generally enough to mitigate this risk.
- Network sniffer is a program that will record all network activity from the infected computer to the internet. Like a software key logger it is hard to verify whether one is in use or not. This threat however can be mitigated by ensuring you only type in confidential information in sites that offer an encrypted link back to you.
- The final threat is phishing/misdirection. A malicious user could change the internet settings of a public computer to have it go through another remote computer that the malicious user has control over in order to spy on all the traffic before sending it to the intended destination. This is called a man in the middle attack. This attack could potentially apply to any website. If you are going to access your bank from such a public computer take note of any prompts you get. Your bank will generally try to establish a secure connection with you and this procedure has safeguards against this sort of attack. The bank will ensure that it’s connecting directly to you while your web browser will ensure you’re connecting directly to the bank. If someone is between your web browser and the bank, the web browser will issue an error regarding the security certificate. If that happens don’t go any further. Do not click okay, instead walk away from the computer in question and advise the staff.
Apart from protecting against threats there are also good practices to follow. Do not connect to a bank if your online banking isn’t protected with a two factor authentication system. Generally this means having a token that generates a different pass code each time you want to log in. With such a system if someone manages to copy your pass code it will not be of use to him as these are not reusable.
While inconvenient it is a very good idea to change the password of any accounts you log into from a public machine. This should be done as soon as you got access to a secure computer. This procedure will ensure that if your credentials are compromised those compromised credentials will not be of use to the hacker. Alternatively if you own any of the systems that you log into use ‘one time use’ passwords. This will avoid you having to change the password after each login whilst not leaving you vulnerable until you’re able to change the password.
These are just basic precautions and following these tips will still not make you completely safe because the truth of the matter is that there is no way to be 100% safe when using a public machine, so if this can be avoided all the better. Alternatively a safer way would be to connect to a public network with your own computer.









Some online systems use emails for user-logins. It’s very important that for such systems, you don’t use the same password as the one you type for accessing your email. Although most online systems hash or encrypt the passwords stored on the database, their is still a risk that someone might get hold of them. So also make sure that you never use the same email address and password on online applications.
“My ideal recommendation would be to avoid using a public computer at all”
I couldn’t agree more! I would recommend exactly the same. It is true that there are cases when you need to use a public computer but with the wider adoption of wireless and the increased power of mobile devices, I hope that soon the number of people who have to use public computers will drop even more. With public networks (i.e. where you connect with your own device) there are still some risks but it is nothing compared to what you are exposing yourself to when using a public computer.
Oh man the idea of having someone behind my back is not only threatening but extremely creepy as well. What the heck! But I know it happens.
At this time when technologies like mobile phones and PDAs can now access the Internet, I really don’t see the need to use public machines.
Aside from using public machines, we should also be careful about using public or free wifi internet connections.
In Starbucks or libraries, an unsecured Internet connection could become a breeding ground for hackers. They can launch and install keylogging, sniffing, and / or phishing software into your laptops or mobile devices without even you knowing.
Andrew is right, keeping separate passwords for separate services will ensure that if one password is compromised the other system will be safe. It’s good practice that everyone should follow.
Someone could be behind you spying over your shoulder only if you don’t acknowledge their presence. Some good old fashioned eye contact will ensure they move away.