Even weak hackers can pull off a password reset MitM attack via account registration
Even weak attackers can pull off a password reset man-in-the-middle attack by getting you to register at a new website.
Even weak attackers can pull off a password reset man-in-the-middle attack by getting you to register at a new website.
Finland’s Security Intelligence Service, Supo, has advised citizens not to take any electronic devices with them when travelling abroad due to the risk of compromise.
In just a few short years, file sync services such as Dropbox have become an essential part of the business landscape.
Anthony Caruana | 30 Aug | Read more
Mobile devices and social-media services are considered to be the riskiest parts of the corporate IT infrastructure by C-suite executives who see IT security as their top concern and rogue individuals as the biggest threat to their security, according to a new global survey of C-suite attitudes towards data security.
David Braue | 19 Feb | Read more
Although Microsoft ended development of its widely used Forefront Threat Management Gateway (TMG) 2010 tools in April, many organisations are still grappling with the migration of a core security service that had become so irretrievably interwoven with network security that it has proved extremely difficult to remove.
David Braue | 24 Jun | Read more
THE EVOLUTION OF THE DIGITAL WORKPLACE The global workplace is shifting to an environment that fosters an interactive and collaborative relationship with its stakeholders. This new “active facility” design is quickly replacing the existing passive workplace.