How to gain trust back in your cybersecurity system

What is a Man-In-The-Middle attack?

Samuel Metzler Consumer Protection, Data Breach, Security Threats

What is a Man-In-The-Middle attack?

Remember that episode of Spongebob Squarepants where the titular character and his best friend Patrick are sitting in their backyards passing messages through blowing bubbles? As usual, their antics bother their neighbor Squidward who decides to retaliate by popping their …

Effective Cybersecurity Starts With People

Jake Ludin Case study, Data Breach

Effective Cybersecurity Starts With People

Large banking institutions like Capital One are among the most targeted organizations by cyber-criminals looking to profit through data theft. Banks are responsible for protecting heaps of personal information about their customers, as well as financial wealth and transactions. This …

Equifax security breach

Equifax’s Story: The Risks of Lax Security

Jake Ludin Case study, Data Breach

Equifax’s Story: The Risks of Lax Security

On July 29th, 2017, Equifax discovered that data was leaking out of the credit bureau’s databases and had been since approximately mid-May of that year. They publicly reported the incident on September 7th, and it quickly became known as one …

ICloud's website was compromised and left many vulnerable to MITM attacks

ICloud.Com Website Compromised In China, Leading To The Potential For Rampant Man-In-The-Middle Attacks

News Data Breach

ICloud.Com Website Compromised In China, Leading To The Potential For Rampant Man-In-The-Middle Attacks

  Last week, after a report of a hack into iCloud.com in China, Apple posted a security notice on its website, telling browser users to pay attention to warnings of unsecure digital certificates. Perpetrators plan organized network attacks using unsecure …