I remember as a child trying to eavesdrop on conversations I would hear in school. They usually were centered around who kissed whom or who had a crush on someone. As an adult, like most others, I still listen in on other people’s conversations from time-to-time. Usually this happens when you’re standing in line somewhere, and it is hard to not listen in on the people next to you. After talking with a colleague over the weekend about man-in-the-middle (MITM) attacks, I found some similarities to the more typical activity of eavesdropping on others conversations.
Showing posts with label hack. Show all posts
Showing posts with label hack. Show all posts
Wednesday, March 25, 2015
Defending against the Man in the Middle
I remember as a child trying to eavesdrop on conversations I would hear in school. They usually were centered around who kissed whom or who had a crush on someone. As an adult, like most others, I still listen in on other people’s conversations from time-to-time. Usually this happens when you’re standing in line somewhere, and it is hard to not listen in on the people next to you. After talking with a colleague over the weekend about man-in-the-middle (MITM) attacks, I found some similarities to the more typical activity of eavesdropping on others conversations.
Labels:
anti-virus,
authentication,
certificate based authentication,
cybersecurity,
data,
data protection,
firewall,
hack,
Hacker Attacker,
hacker news,
hacker solutions,
hackers,
ITsecurity,
Man in the middle,
MITM,
SSL
Thursday, December 11, 2014
TedTalk - A Future Without Secrets
When you think of social media being used to find out
information about you, you may be thinking that you have nothing to hide, and
your Internet identity is looking pretty good. In fact, you have spent a lot of
time creating an image of yourself that is pretty close to perfect in your
eyes. But do you believe that the data on Facebook alone can be used to guess your
Social Security Number, compromise a job opportunity, and manipulate
advertisement?
Any information can become sensitive information. By using
algorithms, technology, your friends on Facebook, and face recognition, you can
be manipulated both knowingly and unknowingly. Protecting this information is
important to your future, and it is time to take action!
Labels:
cybersecurity,
hack,
hackers,
hacking,
it,
ITsecurity,
tech,
tedtalk
Subscribe to:
Posts (Atom)