Man in the Browser (MITB)

On the Octopus Blog, we take a keen interest in the most prevalent hacks used by cybercriminals today. Understanding the science and methodology behind these attacks can help users be better prepared and equipped to protect their data and digital identities. Among the more nefarious techniques employed by hackers, the Man-in-the-Middle (MITM) is a particularly nasty one. A well-executed attack can [...]

The Ultimate Guide to Man in the Middle (MITM) Attacks and How to Prevent them

In the realm on protecting digital information, a man-in-the-middle (MITM) attack is one of the worst things that can happen to an individual or organization. MITM attacks happen when an unauthorized actor manages to intercept and decipher communications between two parties and monitors or manipulates the exchanged information for malicious purposes. For instance, hackers can stage MITM attacks to steal sensitive [...]

Certificates and Inherit Trust

On the Octopus Blog, we’ve delved quite a bit into the vulnerabilities of contemporary encryption standards. The system of Public Key Infrastructure (PKI) which forms the basis of most of the worlds authentication platforms, while presenting a powerful, easy to use encryption model, still left several holes through which attackers can breach networks and steal identities. Perhaps the single biggest problem [...]

Stopping Man-In-The-Middle Attacks with Cryptography

Man-in-the-middle (MITM) attacks – where an attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other – are a very real threat, especially when it comes to authentication. Various solutions have been put forward to prevent, or at least manage, this threat. These have met varying levels of success, although it [...]

Zero Knowledge Proof – What Peggy Knows About Victor

Zero knowledge proof authentication is the basis of modern-age authentication. It allows for the highest level of security, by ensuring passwords, transactions and conversations don’t get compromised when transferred over an unsecured connection. In this article we will look at zero knowledge proof to understand the need for it, how it works, and where it’s being utilized to verify parties today. [...]

Blockchain Vulnerability to Man-in-the-middle Attacks

Early February this year, researchers found a Man-in-the-middle (MITM) vulnerability in the popular Ledger hardware crypto wallet application that allowed hackers to redirect victims’ funds to their own wallets by changing the destination address of cryptocurrency transactions. The news came as a disappointment to users who considered hardware wallets such as Ledger as the most secure way to store their digital [...]

Search exact
Search sentence
Buy Premium Version to add more powerful tools to this place.