I remember as a child trying to eavesdrop on conversations I would hear in school. They usually were centered around who kissed whom or who had a crush on someone. As an adult, like most others, I still listen in on other people’s conversations from time-to-time. Usually this happens when you’re standing in line somewhere, and it is hard to not listen in on the people next to you. After talking with a colleague over the weekend about man-in-the-middle (MITM) attacks, I found some similarities to the more typical activity of eavesdropping on others conversations.
Showing posts with label firewall. Show all posts
Showing posts with label firewall. Show all posts
Wednesday, March 25, 2015
Defending against the Man in the Middle
I remember as a child trying to eavesdrop on conversations I would hear in school. They usually were centered around who kissed whom or who had a crush on someone. As an adult, like most others, I still listen in on other people’s conversations from time-to-time. Usually this happens when you’re standing in line somewhere, and it is hard to not listen in on the people next to you. After talking with a colleague over the weekend about man-in-the-middle (MITM) attacks, I found some similarities to the more typical activity of eavesdropping on others conversations.
Labels:
anti-virus,
authentication,
certificate based authentication,
cybersecurity,
data,
data protection,
firewall,
hack,
Hacker Attacker,
hacker news,
hacker solutions,
hackers,
ITsecurity,
Man in the middle,
MITM,
SSL
Tuesday, January 13, 2015
Top 5 Solutions to Stop Hackers
And when I say
hackers, I want to be clear. I mean the security crackers that break into your
account to steal your information, max out your credit card, and wreak havoc on
your computer or device! This is not how you intended things to end when you
chose that password that you could remember or ignored Gmail’s new second
factor feature. But, now it is too late. Unless you have a Tardis, you are not
changing the fact that your email or other personal accounts have been
compromised.
Subscribe to:
Posts (Atom)