Digital ID

Apple iMessage vulnerable to MITM attackApple iMessage vulnerable to MITM attack

Apple iMessage vulnerable to MITM attack

Quarkslab researchers Cyril Cattiaux has revealed Apple lied when it claimed it could not intercept iMessages sent by its users.…

12 years ago
Proxy.sh – Can you trust your VPN provider? Maybe …Proxy.sh – Can you trust your VPN provider? Maybe …

Proxy.sh – Can you trust your VPN provider? Maybe …

Proxy.sh VPN service with no-logging policy announced to have sniffed the traffic of US based server to Catch Hackers. Can…

12 years ago
Criminals hacked illegal service exposing Americans to Identity theftCriminals hacked illegal service exposing Americans to Identity theft

Criminals hacked illegal service exposing Americans to Identity theft

An identity theft service that sells personal information on millions of US citizens has been hacked. Millions of US citizens…

12 years ago
Chaos Computer Club claims to have defeated Apple TouchIDChaos Computer Club claims to have defeated Apple TouchID

Chaos Computer Club claims to have defeated Apple TouchID

Chaos Computer Club claims to have bypassed the biometric security technology Apple TouchID by making a copy of a fingerprint photographed…

12 years ago
Android wallet apps vulnerability could allow currency theftAndroid wallet apps vulnerability could allow currency theft

Android wallet apps vulnerability could allow currency theft

Bitcoin.org has released a security advisory related to a serious security flaw related to Android wallet apps that could allow…

12 years ago
Facebook hacked with an SMS, excellent the bug managementFacebook hacked with an SMS, excellent the bug management

Facebook hacked with an SMS, excellent the bug management

The hacker "fin1te"  revealed that Facebook account was hackable within a minute simply with an SMS. Excellent the bug management…

12 years ago
Censorship, governments and corporations enemies of internetCensorship, governments and corporations enemies of internet

Censorship, governments and corporations enemies of internet

The use of technologies to support censorship is deplorable and condemnable but it must be considered that is a sad…

12 years ago
Nokia and the accusation of MITM attackNokia and the accusation of MITM attack

Nokia and the accusation of MITM attack

The charge is heavy, according to some experts, Nokia analyzes user’s traffic officially to increase performance compressing data on some…

12 years ago
Turkey – Another story on use of fraudulent digital certificatesTurkey – Another story on use of fraudulent digital certificates

Turkey – Another story on use of fraudulent digital certificates

It’s the news of the day, a fraudulent digital certificate that could be used for active phishing attacks against Google’s…

13 years ago
Adobe Code Signing Certificate used to sign malware, who to blame?Adobe Code Signing Certificate used to sign malware, who to blame?

Adobe Code Signing Certificate used to sign malware, who to blame?

It's happened again, cyber criminals have stolen digital certificates related to companies recognized reliable to sign malicious code. This time…

13 years ago