Media Access Control (MAC) Address

24th February 2020 | Cybrary Media Access Control (MAC) Address


A Media Access Control (MAC) Address is a hardware identification number that is uniquely assigned to each device on a network. The MAC address is manufactured into every network card, such as an Ethernet card or Wi-Fi card, and therefore cannot be changed. Due to the extremely large amount of networkable devices in the world, each needs a unique MAC Address. MAC Addresses are made up of six two-digit hexadecimal numbers, separated by colons. Different vendors have been allocated blocks of MAC addresses such that you can visit a website with a MAC address to identify the vendor of a specific MAC address.  MACVendor Lookup website

A MAC Address will look like: 00:0a:95:9d:38:16 

Source: TechTerms

Related Reading:  Don’t use MAC address Filtering on your WiFi Network

For more information on MAC Addresses, watch this short 5 min video

CyberHoot does have some other resources available for your use. Below are links to all of our resources, feel free to check them out whenever you like: 

Note: If you’d like to subscribe to our newsletter, visit any link above (besides infographics) and enter your email address on the right-hand side of the page, and click ‘Send Me Newsletters’.

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

Why Security Culture is Critical — And How CyberHoot Makes It Stick

Why Security Culture is Critical — And How CyberHoot Makes It Stick

In today’s cybersecurity landscape, breaches are rarely caused by a lack of technology. Instead, they stem from...

Read more
Top 10 Emerging AI-Based Threats Every Business Must Prepare For

Top 10 Emerging AI-Based Threats Every Business Must Prepare For

Artificial Intelligence (AI) is transforming productivity and efficiency, but it’s also arming cybercriminals...

Read more
Microsoft Rolling Out Token Protection: Practical Guidance for MSPs

Microsoft Rolling Out Token Protection: Practical Guidance for MSPs

Part 2 of Our Microsoft Entra Security Series In Part 1, we explored how Microsoft’s Token Protection...

Read more