mitm - Tagged - Security Boulevard
Kazakhstan

Kazakhstan Spies on its People via Man-in-the-Middle Attack, Again

The Kazakh government is forcing its citizens to install a spyware root certificate, allowing authorities to crack open TLS traffic, such as HTTPS ...
Security Boulevard
Detecting GnuTLS CVE-2020-13777 using Zeek

Detecting GnuTLS CVE-2020-13777 using Zeek

By Johanna Amann, Software Engineer, Corelight CVE-2020-13777 is a high severity issue in GnuTLS. In a nutshell, GnuTLS versions between 3.6.4 (released 2018-09-24) and 3.6.14 (2020-06-03) have a serious bug in their ...
Best Tools for Testing Wi-Fi MITM Attacks

Best Tools for Testing Wi-Fi MITM Attacks

A man-in-the-middle (MITM) attack is a highly effective type of cyber attack that involves a hacker infiltrating a private network by impersonating a rogue access point and acquiring login credentials. The attacker ...
certificates credentials

Digital Certificates vs Password Authentication

Businesses understand the importance of passwords for private data security, but might not realize that using a network with passwords poses many security threats. Every advancement in security technology is followed by ...
EAP-TTLS/PAP Authentication Protocol Is Not Secure

EAP-TTLS/PAP Authentication Protocol Is Not Secure

When designing a new network, there are countless features to consider that have a significant impact on the organization at large. Few functions of the network impact the users more than the ...
the process detailing how Equifax was hacked

Equifax’s Story: The Risks of Lax Security

The post Equifax’s Story: The Risks of Lax Security appeared first on SecureW2 ...

Bad Actors Using MitM Attacks against ASUS to Distribute Plead Backdoor

Researchers believe bad actors are using man-in-the-middle (MitM) attacks against ASUS software to distribute the Plead backdoor. Near the end of April 2019, researchers at ESET observed several attack attempts that both ...
Lenovo Watch X Pairing - A Little Too Easy

Your Lenovo Watch X Is Watching You & Sharing What It Learns

A friend of mine offered me a Lenovo Watch X – which costs around €60 – in return for helping him with a security project. I was impressed with the design and ...
device onboarding

How to Efficiently Onboard Thousands of Devices

Each year, college campuses must navigate the trials associated with successfully connecting thousands of new students to the wireless network. This may have been moderately challenging 10 years ago, but the explosion ...