What is a man-in-the-middle attack? How MitM attacks work and how to prevent them

Posted on February 13th, 2019 by Responsible Cyber

A man-in-the-middle (MitM) attack is when an attacker intercepts communications between two parties either to secretly eavesdrop or modify traffic traveling between the two. Attackers might use MitM attacks to steal login credentials or personal information, spy on the victim, or sabotage communications or corrupt data. “MITM attacks are a tactical means to an end,” […]

Read More

The Evolution of Darknets – Schneier on Security

Posted on February 1st, 2019 by Responsible Cyber

To prevent the problems of customer binding, and losing business when darknet markets go down, merchants have begun to leave the specialized and centralized platforms and instead ventured to use widely accessible technology to build their own communications and operational back-ends. Instead of using websites on the darknet, merchants are now operating invite-only channels on […]

Read More

iCloud Possibly Suffered A Privacy Breach Last Year That Apple Kept a Secret

Posted on February 1st, 2019 by Responsible Cyber

Late last year when an unknown group of hackers stole secret access tokens for millions of Facebook accounts by taking advantage of a flaw in its website, the company disclosed the incident and informed its affected users.Similarly, when Twitter was hit by multiple vulnerabilities (#1, #2, #3) in the last few months, the social media […]

Read More

What is a supply chain attack? Why you should be wary of third-party providers

Posted on January 30th, 2019 by Responsible Cyber

A supply chain attack, also called a value-chain or third-party attack, occurs when someone infiltrates your system through an outside partner or provider with access to your systems and data. This has dramatically changes the attack surface of the typical enterprise in the past few years, with more suppliers and service providers touching sensitive data […]

Read More

15 secure coding practices to use in digital identity

Posted on January 30th, 2019 by Responsible Cyber

When software analysis firm CAST analyzed 1380 software applications they found a whopping 1.3 million software vulnerabilities in the code. Anyone reading CSO will know that software flaws give cybercriminals an open door. Identity management is arguably the most at risk service of all technology disciplines. Identity theft stalks us all. Javelin Research has reported […]

Read More

Top security and privacy TED Talks from 2018

Posted on January 30th, 2019 by Responsible Cyber

Ninety-five percent of the time when I watch videos about cybersecurity, hacking, privacy, or surveillance, they are videos from security conferences. In fact, some of the best out there are TED talks. While most of the great ones were made years ago (between 2008 and 2017), 2018 had several worth watching. Here’s a look at […]

Read More