Everything You Need to Know to Avoid a Man-in-the-Middle Mobile Attack
Monkey in the middle, the beloved playground staple, extends beyond schoolyards into corporate networks, home desktops, and personal mobile devices in a not-so-fun way. Known as a monkey-in-the-middle or man-in-the-middle attack (MiTM), it’s a type of cybercrime that can happen to anyone. Here’s everything you need to know about mobile MiTM schemes specifically, how to […] more…DeepWeb and Cybercrime – it is not just the Silk Road
The infamous Silk Road marketplace is probably the most well-known place online for anyone wanting to purchase all sorts of illegal goods – ranging from illicit drugs, to firearms and all the way up to hitmen-for-hire. Yesterday, after two and half years in operation, the site was shut down by the FBI and its owner […] more…Deep Web and Cybercrime – It Is Not Just the Silk Road
The infamous Silk Road marketplace is probably the most well-known place online for anyone wanting to purchase all sorts of illegal goods – ranging from illicit drugs, to firearms and all the way up to hitmen-for-hire. Yesterday, after two and half years in operation, the site was shut down by the FBI and its owner […] more…More information
- To punish Symantec, Google may distrust a third of the web’s SSL certificates
- Second Ivanti EPMM Zero-Day Vulnerability Exploited in Targeted Attacks
- Epic in hot water over Steam-scraping code
- ForeScout Acquires Industrial Security Firm SecurityMatters for $113 Million in Cash
- Microsoft Publisher CVE-2013-1329 Remote Code Execution Vulnerability
- 26 Security Issues Patched in TeamCity
- Hackers Claim to Auction Data They Stole From NSA-Linked Spies
- For a Winning Security Strategy, Redefine the Threat Landscape
- Oracle Patches 230 Vulnerabilities With April 2024 CPU
- Flippy the burger-flipping robot too good, fired after one day