Search Results For: man in the middle attack

NordVPN, widely regarded as one of the best virtual private network (VPN) services, confirmed one of its datacenters was hacked. The security breach occurred over a year ago, in March 2018, though is just now being disclosed to users. Apparently NordVPN used the time between then and now to audit its infrastructure and make... Read more...
In an ongoing effort to stay one step ahead of the bad guys (or at least keep pace with them), Google has decided to block sign-ins from embedded browser frameworks, such as the Chromium Embedded Framework (CEF). The new policy will go into effect in June, so developers... Read more...
When Epic Games announced that it wouldn't be putting its world-dominating Fortnite Android game on the Google Play store, everyone knew Google wouldnt be happy. Epic didn't want to pay Google 30% of every purchase via the app, a move that could potentially cost Google $50 million... Read more...
Macs used to have a persona of "no viruses or hacks" with many feeling like the MacBook and other Apple computers were more secure and therefore better than Windows counterparts. This was a long-running argument in PC enthusiast circles and despite ample evidence... Read more...
Fortnite is currently thehottest gamein the world and appeals to a wide spectrum of gamers both young and old. However, its immense popularity also means that it is often the target of malware authors and scammers. That became readily apparent over the past few weeks by... Read more...
Cisco, the world's largest networking company in the world, has published additional details in regards to VPNFilter, a nasty piece of malware that was discovered to have infected half a million consumer network devices scattered across 54 countries last month. The company's... Read more...
Given the industry-wide panic that was unleashed following the disclosure of the Meltdown and Spectre processor vulnerabilities (with Intel taking the brunt of the heat), many are on edge about the potential for similar exploits to be discovered... Read more...
A security flaw that was first discovered in 1998 by Daniel Bleichenbacher has resurfaced, putting at risk some of the most popular websites and services, including Facebook and PayPal. Called ROBOT, the 19-year-old vulnerability can be exploited to perform RSA decryption and... Read more...
We first got a glimpse at the BlueBorne vulnerability back in September, when it was revealed that that Bluetooth-based attack vector was exploitable on phones, computers, and IoT devices -- basically, anything with a Bluetooth radio. BlueBorne was especially nasty since it is... Read more...
A security expert at Belgian university KU Leuven has discovered a major vulnerability in the Wi-Fi Protected Access II (WPA2) protocol that could a expose a user's wireless Internet traffic, including usernames and passwords that are entered into secure websites. The vulnerability... Read more...
A security company called Armis is spilling the beans on a collection of eight different exploits that it is collectively calling BlueBorne. These exploits can allow a hacker access to your phone in seconds without having physical access to the device. Perhaps the... Read more...
We took part in an interesting demo this week that was both eye-opening and somewhat alarming. We met with representatives from Synaptics to discuss what we thought would be its latest sensor technology or HCI device, but were treated to a real-world hacking display that would... Read more...
It seems like a day doesn't go by that we don't hear about some piece of malware that's harassing computer users. In 2017, you would expect that most people would be hesitant to download and extract random, rogue zip files, but sadly, that's not the case. There's a reason these pieces of malware... Read more...
Its another day, and another backdoor Android exploit has been discovered. Last week, we brought you news of a secret backdoor installed on a number of budget Android devices that was beaming personal information (test messages, phone numbers, contacts) to servers in... Read more...
1 2 3 Next