MITM

Security vulnerabilities in Hyundai Blue Link mobile app allowed hackers to steal vehiclesSecurity vulnerabilities in Hyundai Blue Link mobile app allowed hackers to steal vehicles

Security vulnerabilities in Hyundai Blue Link mobile app allowed hackers to steal vehicles

Security vulnerabilities in the Hyundai Blue Link mobile apps allowed hackers to steal vehicles, the car maker fixed them. Security…

8 years ago
Vulnerability in Apple Music for Android could be exploited to steal user dataVulnerability in Apple Music for Android could be exploited to steal user data

Vulnerability in Apple Music for Android could be exploited to steal user data

Apple fixed a vulnerability tracked as CVE-2017-2387 in the Apple Music for Android that could allow attackers to launch MitM…

8 years ago
Researchers discovered severe flaws in the Confide which is also used by White House staffersResearchers discovered severe flaws in the Confide which is also used by White House staffers

Researchers discovered severe flaws in the Confide which is also used by White House staffers

Confide App, the secure messaging app used by staffers in the White House and on Capitol Hill is not as…

8 years ago
A flaw in ESET Endpoint Antivirus allows to hack Apple Macs, patch it nowA flaw in ESET Endpoint Antivirus allows to hack Apple Macs, patch it now

A flaw in ESET Endpoint Antivirus allows to hack Apple Macs, patch it now

A flaw in ESET Endpoint Antivirus is exploitable to get remote root execution on Apple Mac systems via Man-In-The-Middle (MiTM)…

8 years ago
76 Popular iOS apps are vulnerable to man-in-the-middle (MITM) attacks76 Popular iOS apps are vulnerable to man-in-the-middle (MITM) attacks

76 Popular iOS apps are vulnerable to man-in-the-middle (MITM) attacks

A study conducted on iOS mobile apps revealed that many of them are affected by security vulnerabilities that expose users…

8 years ago
Browser User Interface Security ThreatsBrowser User Interface Security Threats

Browser User Interface Security Threats

Google Chrome users beware, hackers are behind you.  Users may be tricked into downloading malware masquerading as a fix for…

8 years ago
Stealth Cell Tower, how to spy on workers with a harmless printerStealth Cell Tower, how to spy on workers with a harmless printer

Stealth Cell Tower, how to spy on workers with a harmless printer

Stealth Cell Tower, it is an antagonistic GSM base station concealed in an office printer that could be used for…

9 years ago
Millions of Xiaomi Smartphone vulnerable to remote hackingMillions of Xiaomi Smartphone vulnerable to remote hacking

Millions of Xiaomi Smartphone vulnerable to remote hacking

Millions of Xiaomi smartphone are affected by a critical remote code execution flaw that could be exploited by hackers to…

9 years ago
Lenovo Accelerator Application contains a bug that allows remote hack of your PCLenovo Accelerator Application contains a bug that allows remote hack of your PC

Lenovo Accelerator Application contains a bug that allows remote hack of your PC

A study of Duo Security revealed that Lenovo Accelerator Application support tool contains a high-risk flaw that allows remote code…

9 years ago
Why surveillance firm Blue Coat was granted a powerful encryption certificate?Why surveillance firm Blue Coat was granted a powerful encryption certificate?

Why surveillance firm Blue Coat was granted a powerful encryption certificate?

Experts discovered that the Controversial Surveillance firm Blue Coat was granted a powerful encryption certificate that can be used for…

9 years ago