mitm
Detecting GnuTLS CVE-2020-13777 using Zeek
By Johanna Amann, Software Engineer, Corelight CVE-2020-13777 is a high severity issue in GnuTLS. In a nutshell, GnuTLS versions between 3.6.4 (released 2018-09-24) and 3.6.14 (2020-06-03) have a serious bug in their ...
Best Tools for Testing Wi-Fi MITM Attacks
A man-in-the-middle (MITM) attack is a highly effective type of cyber attack that involves a hacker infiltrating a private network by impersonating a rogue access point and acquiring login credentials. The attacker ...
Digital Certificates vs Password Authentication
Businesses understand the importance of passwords for private data security, but might not realize that using a network with passwords poses many security threats. Every advancement in security technology is followed by ...
EAP-TTLS/PAP Authentication Protocol Is Not Secure
When designing a new network, there are countless features to consider that have a significant impact on the organization at large. Few functions of the network impact the users more than the ...
Equifax’s Story: The Risks of Lax Security
The post Equifax’s Story: The Risks of Lax Security appeared first on SecureW2 ...
Bad Actors Using MitM Attacks against ASUS to Distribute Plead Backdoor
Researchers believe bad actors are using man-in-the-middle (MitM) attacks against ASUS software to distribute the Plead backdoor. Near the end of April 2019, researchers at ESET observed several attack attempts that both ...
Your Lenovo Watch X Is Watching You & Sharing What It Learns
A friend of mine offered me a Lenovo Watch X – which costs around €60 – in return for helping him with a security project. I was impressed with the design and ...
Credential Theft Threats Facing SMBs
The post Credential Theft Threats Facing SMBs appeared first on SecureW2 ...
How to Efficiently Onboard Thousands of Devices
Each year, college campuses must navigate the trials associated with successfully connecting thousands of new students to the wireless network. This may have been moderately challenging 10 years ago, but the explosion ...
10 Tips to Take Control of Your Public Wi-Fi Security
The amazing ability to surf from anywhere sometimes distracts us from a very basic fact: the information may flow to us – but it can flow from us, in other, undesirable directions.So ...

