Search Results for: Man-in-the-middle Blog Post Man in the middle attacks in Mobile Devices May 18, 2020 Mobile security has always been a weak link for cyber attacks in organizations since mobile devices have been introduced to... Blog Post Quick Tips For Protecting Your Privacy Online January 2, 2020 Privacy is now in danger of no longer being considered an intrinsic right as long as surveillance becomes common in... Knowledge Center NAC Bypass and ARP Spoofing – Case Study February 17, 2020 To ensure the effectiveness of our client’s security implementations LIFARS frequently conducts penetration tests evaluating their systems can hold up... Blog Post How does Public Wi-Fi Allow Cyber Thievery? June 26, 2020 Public Wi-Fi is everywhere – parks, coffeeshops, airports, hotels, public transit, libraries, and restaurants. We have also heard time and... Blog Post Virtual Reality App Found with Critical Vulnerabilities February 25, 2019 Cybersecurity researchers at University of New Haven were able to hack into virtual reality users allowing them to invisibly eavesdrop... Blog Post Internet Traffic Hijack Disrupts and Redirects Google to China and Russia November 13, 2018 An internet redirect hijack that rerouted traffic through Russia and China disrupted multiple Google services, including cloud-hosting and searches, on... Blog Post MFA Best Practices for People and Business to Interact Securely Online May 20, 2021 According to a Gartner report, end-user spending on public cloud services topped $257.5 billion in 2020. This figure is forecast... Blog Post Root CA Security Best Practices for Ensuring Trusted and Compliant Interactions April 19, 2021 Your certification authority (CA) is a key component in securing your network. It is the entity that issues, manages, and... Blog Post The Importance of Email Encryption In Protecting Confidential Company Data December 17, 2021 In the past year, hundreds of individuals made the switch to working from home. The quantity of private information exchanged... Blog Post Avoiding Multi-Factor Authentication – What Can You Do Against It? December 22, 2020 Multi-factor authentication refers to the practice of authenticating users using more than one identity verification methods. An email or username... Blog Post How To Identify Indicators Of Compromise? December 28, 2020 An Indicator of Compromise (or, IoC for short) is any type of forensic evidence that a cyber-attack has taken place.... Knowledge Center Cisco and Fortinet Hacking – Case Study February 9, 2020 To ensure the effectiveness of our client’s security implementations LIFARS frequently conducts penetration tests evaluating their systems can hold up... Blog Post Types of Password Attacks April 27, 2020 In the world of the internet, millions of User accounts are created every day and so are their passwords, being... Blog Post Most Common Wi-Fi Attacks May 4, 2020 The rapid development of smartphones has been about a decade. Compared with the old non-smart phones, the biggest difference should... Blog Post Social engineering Life-Cycle June 17, 2020 According to Cert-Uk definition, Social Engineering refers to the manipulation of individuals in order to induce them to carry out...
Blog Post Man in the middle attacks in Mobile Devices May 18, 2020 Mobile security has always been a weak link for cyber attacks in organizations since mobile devices have been introduced to...
Blog Post Quick Tips For Protecting Your Privacy Online January 2, 2020 Privacy is now in danger of no longer being considered an intrinsic right as long as surveillance becomes common in...
Knowledge Center NAC Bypass and ARP Spoofing – Case Study February 17, 2020 To ensure the effectiveness of our client’s security implementations LIFARS frequently conducts penetration tests evaluating their systems can hold up...
Blog Post How does Public Wi-Fi Allow Cyber Thievery? June 26, 2020 Public Wi-Fi is everywhere – parks, coffeeshops, airports, hotels, public transit, libraries, and restaurants. We have also heard time and...
Blog Post Virtual Reality App Found with Critical Vulnerabilities February 25, 2019 Cybersecurity researchers at University of New Haven were able to hack into virtual reality users allowing them to invisibly eavesdrop...
Blog Post Internet Traffic Hijack Disrupts and Redirects Google to China and Russia November 13, 2018 An internet redirect hijack that rerouted traffic through Russia and China disrupted multiple Google services, including cloud-hosting and searches, on...
Blog Post MFA Best Practices for People and Business to Interact Securely Online May 20, 2021 According to a Gartner report, end-user spending on public cloud services topped $257.5 billion in 2020. This figure is forecast...
Blog Post Root CA Security Best Practices for Ensuring Trusted and Compliant Interactions April 19, 2021 Your certification authority (CA) is a key component in securing your network. It is the entity that issues, manages, and...
Blog Post The Importance of Email Encryption In Protecting Confidential Company Data December 17, 2021 In the past year, hundreds of individuals made the switch to working from home. The quantity of private information exchanged...
Blog Post Avoiding Multi-Factor Authentication – What Can You Do Against It? December 22, 2020 Multi-factor authentication refers to the practice of authenticating users using more than one identity verification methods. An email or username...
Blog Post How To Identify Indicators Of Compromise? December 28, 2020 An Indicator of Compromise (or, IoC for short) is any type of forensic evidence that a cyber-attack has taken place....
Knowledge Center Cisco and Fortinet Hacking – Case Study February 9, 2020 To ensure the effectiveness of our client’s security implementations LIFARS frequently conducts penetration tests evaluating their systems can hold up...
Blog Post Types of Password Attacks April 27, 2020 In the world of the internet, millions of User accounts are created every day and so are their passwords, being...
Blog Post Most Common Wi-Fi Attacks May 4, 2020 The rapid development of smartphones has been about a decade. Compared with the old non-smart phones, the biggest difference should...
Blog Post Social engineering Life-Cycle June 17, 2020 According to Cert-Uk definition, Social Engineering refers to the manipulation of individuals in order to induce them to carry out...