Search Results For: man in the middle attack

If you own an LTE smartphone, you might want to pay close attention. Wanqiao Zhang, a security researcher with Chinese firm Qihoo 360 has demonstrated a vulnerability that can compromises any 4G LTE network around the globe. The attack is so devastating that a hacker with enough... Read more...
Today's a bad day security. First it was discovered that Microsoft accidentally leaked what amounts to a golden key for Secure Boot system, and now we find out there's a rather serious vulnerability in the TCP implementation in all Linux systems since version 3.6... Read more...
If youre a Waze user, listen up! A new exploit has been found that could make it easy for hackers to track your location whenever youre using the popular Google-owned navigation app. The exploit uses an HTTPS proxy to carry out a man-in-the-middle attack to track... Read more...
It doesn't matter if you're chatting with a co-worker about a sensitive business proposal you're putting together or bantering about basketball playoffs with a group of buddies, the idea that a third-party could be intercepting and reading your... Read more...
A newly discovered attack vector is threatening to leave millions of websites underwater, gasping for air. Since we live in an acronym-crazed society, it should come as no surprise that this latest exploit described as Decrypting RSA with Obsolete and Weakened eNcryption goes... Read more...
It seems as though no government agency is immune from hackers these days, with the latest victim being NASA. AnonSec has claimed responsibility for infiltrating NASAs secure internal network to gain access to a treasure trove of data (including the... Read more...
Here's a bit of a strange issue. Microsoft, via its TechNet website, has said that the encryption keys used to secure the connection between a Windows PC and the xboxlive.com domain have been "inadvertently disclosed." At the current time, Microsoft isn't telling... Read more...
Comcast doesnt exactly have a sterling reputation when it comes to customer service or its business practices, and its latest stunt isnt likely to win it to win it much praise either. Comcast doesnt take too kindly to its customers pilfering copyrighted media content... Read more...
If you thought that there couldn't possibly be more unbelievable stories to stem from Edward Snowden's leaks, you're sorely mistaken. Today, we learn of a truly appalling effort that the NSA and its partners worked together on to intercept Android users' connections to install... Read more...
We reported a couple of weeks ago that GitHub was hit with a massive DDoS attack, and given the projects that were targeted; it was widely assumed that China was behind the attack. Now, there's even more evidence of that, and it appears that a brand-new weapon was used... Read more...
Lenovo said it's currently investigating a cyberattack that took the company's website down for several hours earlier this week, though it may not have to look very far. The ornery hacking group known as Lizard Squad is claiming responsibility for the security... Read more...
Earlier this month, it wasdiscoveredthatChinawas using man-in-the-middle (MITM) attacks against Microsoft Outlook and Mozilla Thunderbird email clients, as well as smartphone apps that use IMAP and SMTP protocols. Or did it? A spokesman for the... Read more...
China appears to be bringing the hammer down on American email services attempting to operate on its digital turf without officially banning them. The country briefly stole the cybervillian spotlight from North Korea last year when it allegedly crushed... Read more...
Making money while running a social media service is difficult. Companies like Facebook and Twitter have struggled to monetize their platforms on both desktop and mobile, while striking balances that don't royally tick off users with obnoxious advertising. But in a world where... Read more...
Not long after the initial NSA leaks escaped Edward Snowden's head this past summer, a handful of tech companies assured their customers that personal information stored with them is secure. One such company is Apple, which went on the record to state that even if the... Read more...
The train carrying a vast amount of NSA confidential information continues to trek along today, with a revelation that the government agency conducted man-in-the-middle (MITM) attacks involving a couple of the Web's... Read more...
Security researcher Carlos Reventlov discovered a vulnerability in Instagram version 3.1.2 on the iPhone 4 (iOS 6) that leaves users’ Instagram accounts open to attacks. Specifically, users are at risk for partial eavesdropping and man-in-the-middle attacks that a ne’er-do-well... Read more...
Today's Presidential election figures to be an extremely tight race between Barack Obama and Mitt Romney, and whoever wins -- Mitt Romney, according to AVAST Software's mega-poll -- will likely claim victory by a small margin. But will it be an honest election? We're not making a facetious... Read more...
For years, Apple has propogated the myth that its computers were inherently secure thanks to its BSD roots, inherently better security management, or because Steve Jobs sacrificed puppies under the new moon to keep your platform safe. This created a dangerous perception that Macs... Read more...
iTunes has been updated to version 10.2.2 and includes a few minor bug fixes, one of which is an issue where iTunes may become unresponsive when syncing an iPad. It wouldn't have been so bad except that Apple insists on maintaining tight integration between its mobile products and iTunes software. Version 10.2.2... Read more...
Ah yes, as technology advances, so do surveillance techniques.  So this should surprise no one - should it?Classified documents from September 2007, leaked last week by the German political "Pirate Party," show one particular system that Bavarian police could have in place by February, and its high operating cost.The system, provided... Read more...
Prev 1 2