man-in-the-middle

All Windows systems are vulnerable to the FREAK attack

According to a security advisory published by Microsoft all supported versions of Windows are affected by the recently discovered FREAK…

11 years ago

Time to make you secure from FREAK Vulnerability

FREAK, a new major security flaw that left users of Apple and Google devices exposed to MITM attack while visiting…

11 years ago

FREAK, the new vulnerability that threatens the IT industry

FREAK, a new major security flaw that left users of Apple and Google devices exposed to MITM attack while visiting…

11 years ago

Exploiting DNS Poisoning in Brazilian Boleto Fraud Scheme

In recent months Brazilian criminal crews have started using DNS poisoning technique to target Brazilian Boletos. Security experts at RSA…

11 years ago

TURNIPSCHOOL – DIY NSA spying technology from the NSA Tao catalog

Researchers have presented the TURNIPSCHOOL project and other activities that replicate NSA surveillance implants with cheaper and off the shelf…

11 years ago

Chinese Government runs a MITM attack against Microsoft Outlook

GreatFire revealed that the popular Microsoft Outlook emailing service was subjected to a man-in-the-middle (MITM) attack in China. This time…

11 years ago

Wifiphisher – Automated phishing attacks against Wifi networks

A Greek security researcher has developed WiFiPhisher, a Wi-Fi social engineering tool that is designed to steal credentials from users…

11 years ago

Gmail service has been blocked in China

Gmail has been blocked in China, experts speculated that the Chinese Government used the China's Great Firewall to interfere with…

11 years ago

Misfortune Cookie flaw exposes more than 12 million SOHO routers to the risk of a cyber attack

More than 12 million devices are vulnerable to a simple attack that could compromise their home routers exploiting a vulnerability…

11 years ago

Stingray surveillance devices used to spy on the Norwegian Parliament

A newspaper discovers that bad actors are spying on cell phone communications of Norwegian politicians using the StingRay mobile surveillance…

11 years ago

This website uses cookies.