How to gain trust back in your cybersecurity system

Man-in-the-Middle (MITM) Attacks: Explained

Samuel Metzler Data Breach, Security Threats

Man-in-the-Middle (MITM) Attacks: Explained

If you’ve ever watched this scene from Spongebob Squarepants, then you have a basic understanding of a man-in-the-middle (MITM) attack. How does a man-in-the-middle attack work? The attacker sets up rogue hardware pretending to be a trusted network, namely Wi-Fi, …

Effective Cybersecurity Starts With People

Jake Ludin Case study, Data Breach

Effective Cybersecurity Starts With People

Large banking institutions like Capital One are among the most targeted organizations by cyber-criminals looking to profit through data theft. Banks are responsible for protecting heaps of personal information about their customers, as well as financial wealth and transactions. This …

Equifax security breach

Equifax’s Story: The Risks of Lax Security

Jake Ludin Case study, Data Breach

Equifax’s Story: The Risks of Lax Security

On July 29th, 2017, Equifax discovered that data was leaking out of the credit bureau’s databases and had been since approximately mid-May of that year. They publicly reported the incident on September 7th, and it quickly became known as one …

ICloud's website was compromised and left many vulnerable to MITM attacks

ICloud.Com Website Compromised In China, Leading To The Potential For Rampant Man-In-The-Middle Attacks

News Data Breach

ICloud.Com Website Compromised In China, Leading To The Potential For Rampant Man-In-The-Middle Attacks

  Last week, after a report of a hack into iCloud.com in China, Apple posted a security notice on its website, telling browser users to pay attention to warnings of unsecure digital certificates. Perpetrators plan organized network attacks using unsecure …