certificates credentials

Digital Certificates vs Password Authentication

Businesses understand the importance of passwords for private data security, but might not realize that using a network with passwords poses many security threats. Every advancement in security technology is followed by ...
cyberthreats

Orchestrating Network Security to Handle Cyberthreats

Unfortunately for companies, cybercriminals don’t need to invent the wheel when choosing a way to hack corporate networks. Black hat hackers have a choice of cyberthreats and attack methods on a silver ...
Security Boulevard
SpongeBob SquarePants | Naughty Nautical Neighbours | Nickelodeon UK

Man-in-the-middle (MITM) attacks: explained

If you’ve ever watched this scene from Spongebob Squarepants, then you have a basic understanding of a man-in-the-middle (MITM) attack. How does a man-in-the-middle attack work? The attacker sets up rogue hardware ...

Addressing Theft Threats From All Angles

The post Addressing Theft Threats From All Angles appeared first on SecureW2 ...
Magecart-Style Website Supply Chain Attacks

Volunteer Project Takes Down 100,000 Malware Distribution Sites

A community of volunteer researchers has managed to take down around 100,000 malware distribution websites over the past 10 months as part of a new URL blacklisting project. The initiative, called URLhaus, ...
Security Boulevard
MITM Vulnerabilities Found in Mobile Banking Apps

MITM Vulnerabilities Found in Mobile Banking Apps

A team of researchers has found issues with the validation of TLS certificates for mobile banking and other security-focused applications that could allow man-in-the-middle (MITM) attackers to decrypt their traffic. Some of ...