previous arrow
next arrow
Slider

Man in the Cloud

While cloud computing promises to offload tasks like data storage and processing power, the biggest concerns of it are data security and privacy. To gain access to cloud accounts, MitC attacks take advantage of the OAuth synchronisation token system used by cloud applications. The majority of popular cloud services like Dropbox, Microsoft OneDrive, Google Drive, and more, each save one of these tokens on a user’s device to improve usability. However, the anytime, anywhere nature of cloud services means that the same token can grant access to an attacker to access and copy a token to infiltrate the victim’s cloud remotely.

Locations

Get a Quote

If you have questions or comments, please use this form to reach us, and you will receive a response within one business day. Your can also call us directly at any of our global offices.