Certificates Vs Credentials

Samuel Metzler Education, Security Threats

Certificates Vs Credentials

The importance of passwords and data security is self-evident; private data is extremely valuable and must be securely protected. The issue is that using a credential-based network has become obsolete and poses many security threats. Advancements in security technology produces …

How to gain trust back in your cybersecurity system

What is a Man-In-The-Middle attack?

Samuel Metzler Consumer Protection, Data Breach, Security Threats

What is a Man-In-The-Middle attack?

Remember that episode of Spongebob Squarepants where the titular character and his best friend Patrick are sitting in their backyards passing messages through blowing bubbles? As usual, their antics bother their neighbor Squidward who decides to retaliate by popping their …

Addressing Theft Threats From All Angles

Jake Ludin Security Threats

Addressing Theft Threats From All Angles

The looming threat of a data breach has influenced many organizations to step up the security protecting their wireless network. Organizations with personnel files, financial information, and other types of valuable data are a potential target for hackers, so many …

Samsung Keyboards Vulnerable to Man-in-the-Middle Exploit

News Security Threats

Samsung Keyboards Vulnerable to Man-in-the-Middle Exploit

During a presentation at BlackHat London in early June, a major vulnerability in software that comes bundled with Samsung phones was unveiled. The bug, uncovered by NowSecure researcher Ryan Welton, lets intruders hijack software updates for Swiftkey, the device’s default ...