84% of Businesses Are Likely to Expand WFH Ability Despite Security Risks. Is Remote Work Becoming the New Normal?

Despite the downsides of replacing on-premise work with remote work, 84% of companies anticipate a consistent expansion of remote work practices, according to a 2020 Remote Work-From-Home Cybersecurity Report published earlier this ...
coronavirus

The Impact of Coronavirus on the Threat Landscape

How has the coronavirus impacted the outlook on security over the next few years? The Information Security Forum (ISF) recently released its annual “Threat Horizon” report, looking ahead to 2020-2022. And frankly, ...
Security Boulevard
Neo-Urban, Laptop, Hardware, Computer, Keyboard

The Department of Health Under DDoS Attack

In uncertain times, average people rise to the occasion to help their fellow man. While we experience uncertainty, the best of us face the challenge. Unfortunately, not everyone is so altruistic and ...
man-in-the-middle-attack

Without Server Certificate Validation, WPA2-Enterprise Isn’t Secure

The post Without Server Certificate Validation, WPA2-Enterprise Isn’t Secure appeared first on SecureW2 ...
IoT devices must be secured to protect the network

Certificate Security for IoT Devices

Internet of Things (IoT) devices have been a rapidly growing industry trend that can provide invaluable and unique data to many organizations. While most devices are designed to maximize the efficiency of ...
Image result for what is a public pki"

Risks of a Public Certificate Authority

Recently, cybercriminals have begun targeting public Certificate Authorities (CA) to obtain legitimate certificates and then sell them on the black market. Because these are verified and signed certificates obtained by unjust means, ...
Hacktivity 2012 - Vivek Ramachandran - Cracking WPA/WPA2 Personal and Enterprise for Fun and Profit

PEAP-MSCHAPv2 Vulnerability Allows For Credential Theft

In 2013, Microsoft released a report of a known security vulnerability present within Wi-Fi authentication. The authentication protocol known as PEAP-MSCHAPv2, a widely supported standard, can be exploited to gain user login ...
This is how hackers hack you using simple social engineering

Stronger Multi-Factor Authentication With Certificates

It’s widely held knowledge that using a single factor for authentication to wireless networks is less than secure and easily exploited by hackers. Many organizations recognize this and utilize Multi-Factor Authentication (MFA) ...
certificates credentials

Digital Certificates vs Password Authentication

Businesses understand the importance of passwords for private data security, but might not realize that using a network with passwords poses many security threats. Every advancement in security technology is followed by ...
Public key cryptography - Diffie-Hellman Key Exchange (full version)

What is Public Key Cryptography?

Public key cryptography, a synonym for asymmetric cryptography, is a clever cryptographic system that allows two parties to exchange encrypted information publicly without worry of interception. Many cryptographic systems are symmetric. Two ...