MITM

The Chinese Government runs MitM attack on Google usersThe Chinese Government runs MitM attack on Google users

The Chinese Government runs MitM attack on Google users

The Chinese Government is running a MITM attack on SSL encrypted traffic between Chinese China Education and Research Network and…

11 years ago
Instagram Adroid App affected by account session Hijacking flawInstagram Adroid App affected by account session Hijacking flaw

Instagram Adroid App affected by account session Hijacking flaw

A security researcher disclosed a serious issue on Instagram’s Android Application which could be exploited by an attacker to impersonate…

11 years ago
Gmail App for iOS vulnerable to Man-in-the-Middle AttacksGmail App for iOS vulnerable to Man-in-the-Middle Attacks

Gmail App for iOS vulnerable to Man-in-the-Middle Attacks

Security experts at Lacoon discovered a vulnerability in the Gmail iOS app which enables a bad actor to perform a…

11 years ago
LinkedIn vulnerable to MITM attack that leverages an SSL stripping could expose users data at riskLinkedIn vulnerable to MITM attack that leverages an SSL stripping could expose users data at risk

LinkedIn vulnerable to MITM attack that leverages an SSL stripping could expose users data at risk

Security experts at Zimperium firm revealed that LinkedIn users could be potentially vulnerable to Man-in-the-Middle attacks leveraging an SSL stripping.…

11 years ago
Who and how is using forged SSL certificates worldwide?Who and how is using forged SSL certificates worldwide?

Who and how is using forged SSL certificates worldwide?

Who is abusing of forged SSL certificates in MITM attacks worldwide? A team of researchers implemented a new detection technique…

11 years ago
For Google it is time to encrypt all GMail connectionsFor Google it is time to encrypt all GMail connections

For Google it is time to encrypt all GMail connections

Google has announced to have adopted encrypt mechanisms for all Gmail connections to reply to the increasing demand of privacy…

11 years ago
WhatsApp flaw allows hackers to steal private Chats on Android devicesWhatsApp flaw allows hackers to steal private Chats on Android devices

WhatsApp flaw allows hackers to steal private Chats on Android devices

A security consultant disclosed a security flaw in WhatsApp which can be exploited to gain access to the private chats…

11 years ago
GnuTLS flaw in certificate verification exposes Linux world to attacksGnuTLS flaw in certificate verification exposes Linux world to attacks

GnuTLS flaw in certificate verification exposes Linux world to attacks

A serious flaw in the certificate verification process of GnuTLS exposes Linux distros, apps to attack. Another flaw exploitable for…

11 years ago
SOHO pharming attack hit more that 300,000 devices worldwideSOHO pharming attack hit more that 300,000 devices worldwide

SOHO pharming attack hit more that 300,000 devices worldwide

Researchers at Team Cymru published a detailed report on a large scale SOHO pharming attack that hit more that 300,000…

11 years ago
FireEye discovered an Apple vulnerability which allows iOS keyloggingFireEye discovered an Apple vulnerability which allows iOS keylogging

FireEye discovered an Apple vulnerability which allows iOS keylogging

Researchers at FireEye have developed a POC that exploits an Apple vulnerability to implement a Background Monitoring on Non-Jailbroken iOS…

11 years ago