MITM

US-CERT: Leaked WPAD queries could expose corporate to MitM attacksUS-CERT: Leaked WPAD queries could expose corporate to MitM attacks

US-CERT: Leaked WPAD queries could expose corporate to MitM attacks

Leaked WPAD queries could result in domain name collisions with internal network naming schemes exposing corporate to MITM attacks. The…

9 years ago
Kazakhstan – Telco Company Kazakhtelecom will order their costumers to install rogue certificatesKazakhstan – Telco Company Kazakhtelecom will order their costumers to install rogue certificates

Kazakhstan – Telco Company Kazakhtelecom will order their costumers to install rogue certificates

The Government of the Kazakhstan makes it mandatory for its citizens to install rogue security certificates to monitor them online.…

9 years ago
Snooping Samsung S6 calls with bogus base stationsSnooping Samsung S6 calls with bogus base stations

Snooping Samsung S6 calls with bogus base stations

A duo of security researchers, Daniel Komaromy of San Francisco and Nico Golde of Berlin, demonstrated how to intercept calls…

10 years ago
Crooks stole €600,000 in MitM attacks on EMV CardsCrooks stole €600,000 in MitM attacks on EMV Cards

Crooks stole €600,000 in MitM attacks on EMV Cards

A group of French researchers discovered how Fraudsters Stole nearly $680,000 Via MitM Attack on EMV Cards. On October 1st,…

10 years ago
Apple has several apps from the official iOS App StoreApple has several apps from the official iOS App Store

Apple has several apps from the official iOS App Store

Apple has removed mobile apps from the iOS Apple store that are installing root CA certificates that enable traffic to…

10 years ago
Samsung smart fridge opens Gmail login to hackSamsung smart fridge opens Gmail login to hack

Samsung smart fridge opens Gmail login to hack

At the recent DEF CON hacking conference penetration testers demonstrated that  Samsung smart fridge leaves Gmail logins open to attack.…

10 years ago
Internal emails reveal Hacking Team is working on a weaponized spying droneInternal emails reveal Hacking Team is working on a weaponized spying drone

Internal emails reveal Hacking Team is working on a weaponized spying drone

Experts who are analyzing the Hacking Team internal emails discovered that the firm is working on the development of a…

10 years ago
A large number of websites and web services affected by the LogJam TLS flawA large number of websites and web services affected by the LogJam TLS flaw

A large number of websites and web services affected by the LogJam TLS flaw

Researchers have discovered a new  TLS vulnerability dubbed LogJam that open a large number of online services to cyber attacks.…

10 years ago
Dark Web Email Service SIGAINT hacked by the IntelligenceDark Web Email Service SIGAINT hacked by the Intelligence

Dark Web Email Service SIGAINT hacked by the Intelligence

The Dark Web email service SIGAINT suffered a major attack that involved 70  exit nodes, a circumstance that suggests Government…

10 years ago
Great Cannon, the powerful Chinese hacking platformGreat Cannon, the powerful Chinese hacking platform

Great Cannon, the powerful Chinese hacking platform

Researchers uncovered the Great Cannon, a powerful hacking tool, used by the Chinese Government to run MITM attacks, that was…

10 years ago