Man-in-the-middle attack: Real-life example and video walkthrough [Updated 2021]

Is your web browsing private, or is a man in the middle looking at everything you do? Learn what a man-in-the-middle (MITM) attack is, how to set up and execute…

Cryptocurrency Enforcement Framework: Impacts on digital forensic investigations

Back in 2010, Laszlo Hanyecz bought two pizzas for 10,000 bitcoins. This was the first transaction using the novel technology based on a blockchain, cryptocurrency. As I write, a single…

How CISOs can stay ahead of ransomware attacks

Trend Micro – Trend Micro – Ransomware continues to hinder enterprises with targeted attacks using a myriad of techniques, including 2020’s most common approach of double extortion. Organizations need to…

Hacking communities in the deep web [updated 2021]

The role of hackers has changed over the years, in the past these professionals were viewed as dangerous criminals that needed to be kept at arm’s length; meanwhile today they…

Insider Threat: How to Protect Your Business from Your Own Employees

It’s trite to write that the company’s data and customer base are the main assets of any business in the 21st century. However, the attitude to these assets is still…