What is a Man-In-The-Middle Attack

What is a Man-In-The-Middle Attack Smartphones and tablets have become the first point of access to the internet. This evolution has led to the creation of many Wi-Fi networks so people can connect from almost anywhere, but it opens a new playground for hackers. The growing amount of public networks and users who get connected to them has increased Man-In-The-Middle attack opportunities.…

Wikileaks, Twitter hacks : 6 best practices to avoid data theft

Wikileaks revealing that the CIA turns our connected objects into spying tools, Twitter accounts getting hacked... Do you know how to protect your data ? The American intelligence agency would have elaborated several thousands malicious programs: virus, Trojan, malware… to take control and spy on us through our smartphones, connected televisions and even through our cars. We discover in those revelations that…

Banking Mobile Applications : Pradeo sounds the alarm!

A few weeks ago, we finalized a study aiming to assess the vulnerability level of banking mobile applications in front of threats coming from users’ device environment. Here are some background information to cast light on our approach and conclusions.   First of all, some history… In every single conversation we have with banks, we are struck by the fact that…

A good reputation is not enough

  At the beginning, reputation for websites was created to ease the users’ experience, giving them a quick security audit. The website’s score was based on criterion such as the age of it or its location changes. Security companies send numerous requests to estimate the level of riskiness of a website. Users can then protect themselves from the most malicious…