• All Community
    • All Community
    • Forums
    • Ideas
    • Blogs
Advanced

Search

Search results

New "FREAK" Vulnerability Can Allow Attackers To Decrypt Encrypted Communications

A newly discovered vulnerability, dubbed, “FREAK”, that could allow attackers to intercept and decrypt encrypted traffic between browsers and web sites via a Man-in-the-Middle (MitM) attack, was discovered on March 3rd, 2015 by researchers. Once an attack ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
04-Mar-2015 | 3:30PM
Comments:
2
Kudos:
1

What Is A Man In The Middle Attack?

日本語 In a sense, a man-in-the-middle attack (MITM) is like eavesdropping. Data is sent from point A (computer) to point B (server/website), and an attacker can get in-between these transmissions. They then set up tools programmed to “listen in” on transmis ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
04-Mar-2015 | 1:46PM
Comments:
1
Kudos:
2

Malware 101: How Do I Get Malware on My Computer? Part Two

In other posts, we’ve explained the different types of malware on the threat landscape, and some of the less complicated ways your computer can become infected with malware. In this article we’ll talk about the more complicated types of attacks that cyber ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
16-Mar-2015 | 2:18PM
Kudos:
3

New Vulnerability in OpenSSL Could Allow Attackers to Intercept Secure Communications

A new weakness in OpenSSL could allow attackers to hijack secure communications by tricking a targeted computer into accepting invalid and untrusted SSL certificates as valid certificates. This could help facilitate man-in-the-middle (MITM) attacks, where ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
09-Jul-2015 | 4:36PM
Kudos:
2

Some Dell Computers Found Vulnerable to Man-in-the-middle Attacks Due to Root Certificate Vulnerability

It has been recently discovered that some Dell computers are vulnerable to man-in-the-middle attacks because of an issue with a root certification authority.  ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
24-Nov-2015 | 3:47PM
Kudos:
2

Symantec Financial Threats Report Gives Consumers Security Tips

It’s tax season, so our finances are top of mind for many of us. Cybercriminals are thinking about our money, too. After all, most cybercrimes are committed for monetary gain. According to the Symantec report titled “ Financial Threats 2015,” cyber thieve ...
Blog Post
Author:
J2K2 Employee
Posted:
24-Mar-2016 | 8:08AM
Kudos:
2

The Risks of Public Wi-Fi

日本語 Picture this. It’s Saturday morning and you’re hanging out at your local coffee shop using the free Wi-Fi to catch up on a few tasks you couldn’t quite get to during your busy week. Sound familiar? This is a typical scenario for many of us, but did yo ...
Blog Post
Author:
Nadia_Kovacs Admin Employee
Posted:
25-Apr-2016 | 3:46PM
Comments:
1
Kudos:
3

How to Avoid Public Wi-Fi Woes on a Business Trip

As summer arrives, it’s not just families that will be filling airports and hotels. While other people may be vacationing, business travelers will continue to work their way around the country and the world, often using unsafe public Wi-Fi. ...
Blog Post
Author:
J2K2 Employee
Posted:
16-Jun-2016 | 8:00AM
Kudos:
2