MITM

Vulnerability in Apple Music for Android could be exploited to steal user data

Apple fixed a vulnerability tracked as CVE-2017-2387 in the Apple Music for Android that could allow attackers to launch MitM…

7 years ago

Researchers discovered severe flaws in the Confide which is also used by White House staffers

Confide App, the secure messaging app used by staffers in the White House and on Capitol Hill is not as…

7 years ago

A flaw in ESET Endpoint Antivirus allows to hack Apple Macs, patch it now

A flaw in ESET Endpoint Antivirus is exploitable to get remote root execution on Apple Mac systems via Man-In-The-Middle (MiTM)…

7 years ago

76 Popular iOS apps are vulnerable to man-in-the-middle (MITM) attacks

A study conducted on iOS mobile apps revealed that many of them are affected by security vulnerabilities that expose users…

7 years ago

Browser User Interface Security Threats

Google Chrome users beware, hackers are behind you.  Users may be tricked into downloading malware masquerading as a fix for…

7 years ago

Stealth Cell Tower, how to spy on workers with a harmless printer

Stealth Cell Tower, it is an antagonistic GSM base station concealed in an office printer that could be used for…

7 years ago

Millions of Xiaomi Smartphone vulnerable to remote hacking

Millions of Xiaomi smartphone are affected by a critical remote code execution flaw that could be exploited by hackers to…

8 years ago

Lenovo Accelerator Application contains a bug that allows remote hack of your PC

A study of Duo Security revealed that Lenovo Accelerator Application support tool contains a high-risk flaw that allows remote code…

8 years ago

Why surveillance firm Blue Coat was granted a powerful encryption certificate?

Experts discovered that the Controversial Surveillance firm Blue Coat was granted a powerful encryption certificate that can be used for…

8 years ago

US-CERT: Leaked WPAD queries could expose corporate to MitM attacks

Leaked WPAD queries could result in domain name collisions with internal network naming schemes exposing corporate to MITM attacks. The…

8 years ago

This website uses cookies.