Problems understanding the use of Distance Bounding against Man-In-The-Middle attacks

I currently have to write a paper for university in my Network Security lecture about methods of secure location verification. Therefore, I chose to write about several distance bounding protocols, e.g. the one by Brands and Chaum and the … Continue reading Problems understanding the use of Distance Bounding against Man-In-The-Middle attacks

Is there a website that provides details and root cause of data breaches reported in the media?

There are many reports of data breaches, especially ransomware attacks, in the news lately. But it is difficult to determine the root cause or what vulnerabilities were exploited for each one. I would like to know exactly how attackers are… Continue reading Is there a website that provides details and root cause of data breaches reported in the media?