Are Cable Internet Connections Vulnerable To Hackers?

A PC that is connected to the Internet via a cable modem is always vulnerable to a malicious hack attack whenever the PC is on.

A PC that is connected to the Internet via a cable modem (i.e., using a cable television ISP) is always vulnerable to a malicious hack attack whenever the PC is on. Even if a browser is not opened, merely turning on a PC with a cable connection renders the device vulnerable to attack.

Why is this? Because cable ISPs, in providing the Internet access to a user, essentially are creating giant always-connected networks of PCs comprised of all their customers. Cable connections utilize Ethernet cards, which render the user one link in a giant network. Even if a browser is never opened, a cable-connected PC links to the Ethernet-enabled network (i.e., the Internet) as soon as the PC is booted — just as a connection to a LAN or other corporate network renders the device vulnerable to attacks across that network. This gives a hacker access to the user’s hard drive, and opens the door for many kinds of malicious hack attacks.

One way to protect a cable-connected PC from malicious hacks is to disable file-sharing and print-sharing capabilities in the operating system. This is a simple solution for some but for others not a reality as this method basically disables any kind of home networking.

A better method is to install either a hardware or software firewall. A hardware firewall typically is a small device that the cable and the Ethernet card are both connected to. All transmissions pass through the hardware firewall. A software firewall, which is the more common and cheaper of the two methods, is a piece of code that resides on your PC and is always running. The software watches interactions between the PC and the Internet and blocks any suspicious activities.

This article was originally published on August 28, 2003

Webopedia Staff
Webopedia Staff
Since 1995, more than 100 tech experts and researchers have kept Webopedia’s definitions, articles, and study guides up to date. For more information on current editorial staff, please visit our About page.

Related Articles

Human Resources Management System

A Human Resources Management System (HRMS) is a software application that supports many functions of a company's Human Resources department, including benefits administration, payroll,...

How To Defend Yourself Against Identity Theft

Almost every worldwide government agency responsible for identity theft issues will tell you the same thing: The first step to fighting identity theft is...

Infographic

An infographic is a visual representation of information or data. It combines the words information and graphic and includes a collection of imagery, charts,...

Phishing

What is phishing? Phishing is a type of cybercrime in which victims are contacted by email, telephone, or text message by an attacker posing as...

Accenture

Accenture is a global professional services company that specializes in information technology (IT)...

Best Managed Security Service...

Organizations of all sizes can outsource their management of security devices and systems...

Gartner

Gartner is a world-renowned information technology (IT) consultancy and advisory firm that conducts...