Educate Yourself on Click-Bait

Did you know click-bait can install malware onto your device? Access your webcam? Make you pay for services you aren't aware of? If you want to learn how to better protect yourself, skip to the last section. As a very sneaky Web-based attack, "click-jacking" is a common and revolutionized security threat. It's also referred to ...

All Wi-Fi Networks are Currently Vulnerable to Attack

Security researchers have discovered a new attack that exploits our Wi-Fi networks, both at home and in enterprise environments. Most of our home networks are using one of the IEEE 802.11 wireless network protocols, such as 802.11b, 802.11g, 802.11n, or perhaps, 802.11ac. Our home Wi-Fi networks can likely support several 802.11 protocols; however, it is ...

PenTest Edition: Performing a Man-in-the-Middle Attack on a Wireless Network Using Cain & Abel and Wireshark Without Monitor Mode

IntroductionA man-in-the-middle attack occurs when an attacker sits in the middle of the communication between two victim devices, secretly relaying information back and forth on their behalf, similar to a proxy. It can be thought of as active eavesdropping. The attacker cannot only see the communication traveling to-and-from the victim devices, but can also inject ...