man-in-the-middle

All Windows systems are vulnerable to the FREAK attackAll Windows systems are vulnerable to the FREAK attack

All Windows systems are vulnerable to the FREAK attack

According to a security advisory published by Microsoft all supported versions of Windows are affected by the recently discovered FREAK…

10 years ago
Time to make you secure from FREAK VulnerabilityTime to make you secure from FREAK Vulnerability

Time to make you secure from FREAK Vulnerability

FREAK, a new major security flaw that left users of Apple and Google devices exposed to MITM attack while visiting…

10 years ago
FREAK, the new vulnerability that threatens the IT industryFREAK, the new vulnerability that threatens the IT industry

FREAK, the new vulnerability that threatens the IT industry

FREAK, a new major security flaw that left users of Apple and Google devices exposed to MITM attack while visiting…

10 years ago
Exploiting DNS Poisoning in Brazilian Boleto Fraud SchemeExploiting DNS Poisoning in Brazilian Boleto Fraud Scheme

Exploiting DNS Poisoning in Brazilian Boleto Fraud Scheme

In recent months Brazilian criminal crews have started using DNS poisoning technique to target Brazilian Boletos. Security experts at RSA…

10 years ago
TURNIPSCHOOL – DIY NSA spying technology from the NSA Tao catalogTURNIPSCHOOL – DIY NSA spying technology from the NSA Tao catalog

TURNIPSCHOOL – DIY NSA spying technology from the NSA Tao catalog

Researchers have presented the TURNIPSCHOOL project and other activities that replicate NSA surveillance implants with cheaper and off the shelf…

10 years ago
Chinese Government runs a MITM attack against Microsoft OutlookChinese Government runs a MITM attack against Microsoft Outlook

Chinese Government runs a MITM attack against Microsoft Outlook

GreatFire revealed that the popular Microsoft Outlook emailing service was subjected to a man-in-the-middle (MITM) attack in China. This time…

10 years ago
Wifiphisher – Automated phishing attacks against Wifi networksWifiphisher – Automated phishing attacks against Wifi networks

Wifiphisher – Automated phishing attacks against Wifi networks

A Greek security researcher has developed WiFiPhisher, a Wi-Fi social engineering tool that is designed to steal credentials from users…

10 years ago
Gmail service has been blocked in ChinaGmail service has been blocked in China

Gmail service has been blocked in China

Gmail has been blocked in China, experts speculated that the Chinese Government used the China's Great Firewall to interfere with…

10 years ago
Misfortune Cookie flaw exposes more than 12 million SOHO routers to the risk of a cyber attackMisfortune Cookie flaw exposes more than 12 million SOHO routers to the risk of a cyber attack

Misfortune Cookie flaw exposes more than 12 million SOHO routers to the risk of a cyber attack

More than 12 million devices are vulnerable to a simple attack that could compromise their home routers exploiting a vulnerability…

11 years ago
Stingray surveillance devices used to spy on the Norwegian ParliamentStingray surveillance devices used to spy on the Norwegian Parliament

Stingray surveillance devices used to spy on the Norwegian Parliament

A newspaper discovers that bad actors are spying on cell phone communications of Norwegian politicians using the StingRay mobile surveillance…

11 years ago