Usb attack

Don’t Take Candy or USBs from Strangers – USB attack is the serious threat

USB attacks cannot take place without human involvement because they rely on an individual (either knowingly or unknowingly) inserting a flash drive laced with malware into an unprotected device, typically located in a public place such as an office. Sometimes the drives are inserted out of curiosity, but they can also be plugged into a computer located nearby in a misguided act of helpfulness.

Read more
Man-in-the-middle attack

Man-in-the-middle attack – everything you need to know to perform it

Man-in-the-middle attack (MITM) is in fact eavesdropping – a cyberattack where the attacker secretly relays and possibly alters the communications between two parties who believe that they are directly communicating with each other – either to eavesdrop or to impersonate one or both of the parties, making it appear as if a normal exchange of information is underway.

What is the goal?

For example to steal information, for example login credentials, account details and credit card numbers.

Read more