Defense Against Man-In-The-Middle Attacks (MITM)

Author(s):

Jack Warner, ,

MITM, malicious figure stealing card info from a computer, ransomware

What You Need For The Best Defense Against Man-In-The-Middle (MITM) Attacks Man-in-the-middle (MITM) attacks involve the interception of communication between two or more digital systems. Because of this, they are both difficult to detect and to resolve. The best solution, therefore, is defense. Unfortunately, that too has its’ challenges due to a varied range of … Read more

ElsaGate: The Problem With Algorithms

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

Elsagate concept, kids on IPads looking shocked and confused

Social Engineering can take many forms. Sometimes it’s a phone call attempting to extrapolate your mother’s maiden name. Other times it is an email attempting to gain rapport and get you to click on a sketchy link.  However, sometimes you get something much more bizarre. Something like Elsagate. In 2017, many news sources started reporting … Read more

Malicious Apps: For Play or Prey?

Author(s):

Josh Henry, ,

Malicious Apps, hand holding phone with a warning sign on it, red background

Malicious Apps Today’s society is adapting to excessive use of cell phones and personal data stored in them. Federal laws have been changed to protect citizens from police authorities rummaging through our cell phones without the proper documentation. Considering that criminals have much less trouble adapting than lawmakers, they are usually one step ahead and … Read more

Pretexting: The Art of Impersonation

Author(s):

Patrick Putman, ,

Pretexting, hacker working on business interface, sinister, animated

What is Pretexting Pretexting is a social engineering tactic that uses deception and false motives. Simply put, pretexting crafts fictional situations to obtain personal, sensitive, or privileged information. Pretexting often involves researching the target prior to the attack. The data collected is then used to manipulate and deceive the victim. The main goal of the … Read more

Email: The Ultimate Phishing Hole

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

Hole in the ice, fishing line in the hole, boots to the side, email phishing abstract

Recently, we talked about the importance of questioning everything when it comes to cybersecurity; telephone calls, websites, text messages, snaps, any of these mediums are a forum for viruses. As the threats continue to change and grow, many people have started to become more aware of how widespread phishing has become. Phishing has grown in popularity, … Read more

Threat Intelligence: How It Can Help Tackle Malware, Phishing and Hacking

Author(s):

Jonathan Zhang, ,

Man walking down red hallway with icons, threat intelligence abstract

Cyber attacks happen all the time and in multiple forms, causing tremendous harm — e.g., broken trust, financial loss, reputation damage, and intellectual property theft. So preventing and stopping threats surely sounds like a priority, right? The tricky part is that there is not just a one-size-fits-all approach to achieve that. Each organization is unique … Read more