Tag: Malicious Actors

Imagine if the next time you sent a birthday card to a friend, somebody else opened it first. In this scenario, the crook was looking for any cash you might have included in the card before forwarding it on to its rightful owner. This is precisely the concept of a Man-in-the-Middle (MiTM) attack. First documented…

In recent years, massive data breaches have become regular news items – and for a good reason. During these attacks, millions of credentials are leaked and made available to malicious actors. With them, hackers have free reign to attack other sites in the hope of gaining access to user accounts. But there is another, considerable…

It started out as a reliable way to protect websites from the blight of automated bots. But the Completely Automated Public Turing test to tell Computers and Humans Apart, or CAPTCHA, may have met its match. Recent developments in AI software have proven very successful in beating many manifestations of this widely-used test. In many…