Search Results for: mitm Blog Post How does Public Wi-Fi Allow Cyber Thievery? June 26, 2020 Public Wi-Fi is everywhere – parks, coffeeshops, airports, hotels, public transit, libraries, and restaurants. We have also heard time and... Knowledge Center NAC Bypass and ARP Spoofing – Case Study February 17, 2020 To ensure the effectiveness of our client’s security implementations LIFARS frequently conducts penetration tests evaluating their systems can hold up... Blog Post Man in the middle attacks in Mobile Devices May 18, 2020 Mobile security has always been a weak link for cyber attacks in organizations since mobile devices have been introduced to... Knowledge Center LIFARS Password Cracking Case Study March 18, 2020 For this case study we extract used plaintext passwords from more than 1,500,000 cracked active directory hashes from LIFARS’ former... Blog Post Avoiding Multi-Factor Authentication – What Can You Do Against It? December 22, 2020 Multi-factor authentication refers to the practice of authenticating users using more than one identity verification methods. An email or username... Blog Post Types of Password Attacks April 27, 2020 In the world of the internet, millions of User accounts are created every day and so are their passwords, being... Blog Post Xiaomi’s Pre-Installed Security App Found with Vulnerabilities April 5, 2019 Major vulnerabilities were discovered in pre-installed apps on Xiaomi phones. Ironically, the vulnerability was located in the pre-installed security app,... Blog Post 3 Million Android Devices Vulnerable Due to a Dangerous Pre-Installed Rootkit November 24, 2016 Nearly three million Android devices are vulnerable to a man-in-the-middle (MiTM) attack, researchers have discovered, leaving these devices vulnerable to... Blog Post CISO Tips for Effective Communication with the Board April 4, 2016 Clean and effective communication with the rest of the board members is vital to getting your cybersecurity agenda across. A... Blog Post Smart Refrigerators Leave Gmail Logins Vulnerable to Exploits August 24, 2015 Penetration testers have discovered an exploit which could potentially steal Gmail credentials of a user whose information is available in a Samsung smart fridge. Blog Post Stagefright Is Back to Render over a Billion Android Devices Vulnerable October 1, 2015 A new batch of Stagefright bugs that grants attackers the means to execute malicious code that leaves over a billion Android devices vulnerable has been discovered in recent versions of the Android operating system by research Blog Post Unplanned Detour: New Type of MitM Attack Will Drive Your Traffic Astray November 24, 2014 Yet another potentially serious threat smartphone users have to face. This time around, however, it’s not about any one platform... Blog Post An Outside Perspective: U.S. Legal System & Cyberstalking February 22, 2016 Lavinia Popinceanu is a Canadian via Transylvania in Romania and moved to the United States in 2011 to attend a U.S.... Blog Post Why China’s Largest Certificate-Issuing Authority, CNNIC, Is No Longer Trusted April 9, 2015 A chronological look at the reasons for why Google and Mozilla no longer trust certificates issued by the Chinese largest Certificate Authority, the CNNIC. Blog Post FREAK Vulnerability Affects Apple and Android Users Along with 14 Million Sites March 4, 2015 Recent discovery of the FREAK vulnerability reveals that an 14 millions of websites and major web browsers are vulnerable to Man-in-the-Middle attacks.
Blog Post How does Public Wi-Fi Allow Cyber Thievery? June 26, 2020 Public Wi-Fi is everywhere – parks, coffeeshops, airports, hotels, public transit, libraries, and restaurants. We have also heard time and...
Knowledge Center NAC Bypass and ARP Spoofing – Case Study February 17, 2020 To ensure the effectiveness of our client’s security implementations LIFARS frequently conducts penetration tests evaluating their systems can hold up...
Blog Post Man in the middle attacks in Mobile Devices May 18, 2020 Mobile security has always been a weak link for cyber attacks in organizations since mobile devices have been introduced to...
Knowledge Center LIFARS Password Cracking Case Study March 18, 2020 For this case study we extract used plaintext passwords from more than 1,500,000 cracked active directory hashes from LIFARS’ former...
Blog Post Avoiding Multi-Factor Authentication – What Can You Do Against It? December 22, 2020 Multi-factor authentication refers to the practice of authenticating users using more than one identity verification methods. An email or username...
Blog Post Types of Password Attacks April 27, 2020 In the world of the internet, millions of User accounts are created every day and so are their passwords, being...
Blog Post Xiaomi’s Pre-Installed Security App Found with Vulnerabilities April 5, 2019 Major vulnerabilities were discovered in pre-installed apps on Xiaomi phones. Ironically, the vulnerability was located in the pre-installed security app,...
Blog Post 3 Million Android Devices Vulnerable Due to a Dangerous Pre-Installed Rootkit November 24, 2016 Nearly three million Android devices are vulnerable to a man-in-the-middle (MiTM) attack, researchers have discovered, leaving these devices vulnerable to...
Blog Post CISO Tips for Effective Communication with the Board April 4, 2016 Clean and effective communication with the rest of the board members is vital to getting your cybersecurity agenda across. A...
Blog Post Smart Refrigerators Leave Gmail Logins Vulnerable to Exploits August 24, 2015 Penetration testers have discovered an exploit which could potentially steal Gmail credentials of a user whose information is available in a Samsung smart fridge.
Blog Post Stagefright Is Back to Render over a Billion Android Devices Vulnerable October 1, 2015 A new batch of Stagefright bugs that grants attackers the means to execute malicious code that leaves over a billion Android devices vulnerable has been discovered in recent versions of the Android operating system by research
Blog Post Unplanned Detour: New Type of MitM Attack Will Drive Your Traffic Astray November 24, 2014 Yet another potentially serious threat smartphone users have to face. This time around, however, it’s not about any one platform...
Blog Post An Outside Perspective: U.S. Legal System & Cyberstalking February 22, 2016 Lavinia Popinceanu is a Canadian via Transylvania in Romania and moved to the United States in 2011 to attend a U.S....
Blog Post Why China’s Largest Certificate-Issuing Authority, CNNIC, Is No Longer Trusted April 9, 2015 A chronological look at the reasons for why Google and Mozilla no longer trust certificates issued by the Chinese largest Certificate Authority, the CNNIC.
Blog Post FREAK Vulnerability Affects Apple and Android Users Along with 14 Million Sites March 4, 2015 Recent discovery of the FREAK vulnerability reveals that an 14 millions of websites and major web browsers are vulnerable to Man-in-the-Middle attacks.