Search Results For: man in the middle attack

If you own an LTE smartphone, you might want to pay close attention. Wanqiao Zhang, a security researcher with Chinese firm Qihoo 360 has demonstrated a vulnerability that can compromises any 4G LTE network around the globe. The attack is so devastating that a hacker with enough resources... Read more...
Today's a bad day security. First it was discovered that Microsoft accidentally leaked what amounts to a golden key for Secure Boot system, and now we find out there's a rather serious vulnerability in the TCP implementation in all Linux systems since version 3.6... Read more...
If youre a Waze user, listen up! A new exploit has been found that could make it easy for hackers to track your location whenever youre using the popular Google-owned navigation app. The exploit uses an HTTPS proxy to carry out a man-in-the-middle attack to track Waze... Read more...
It doesn't matter if you're chatting with a co-worker about a sensitive business proposal you're putting together or bantering about basketball playoffs with a group of buddies, the idea that a third-party could be intercepting and reading your... Read more...
A newly discovered attack vector is threatening to leave millions of websites underwater, gasping for air. Since we live in an acronym-crazed society, it should come as no surprise that this latest exploit described as Decrypting RSA with Obsolete and Weakened eNcryption goes... Read more...
It seems as though no government agency is immune from hackers these days, with the latest victim being NASA. AnonSec has claimed responsibility for infiltrating NASAs secure internal network to gain access to a treasure trove of data (including the... Read more...
Here's a bit of a strange issue. Microsoft, via its TechNet website, has said that the encryption keys used to secure the connection between a Windows PC and the xboxlive.com domain have been "inadvertently disclosed." At the current time, Microsoft isn't telling... Read more...
Comcast doesnt exactly have a sterling reputation when it comes to customer service or its business practices, and its latest stunt isnt likely to win it to win it much praise either. Comcast doesnt take too kindly to its customers pilfering copyrighted media content... Read more...
If you thought that there couldn't possibly be more unbelievable stories to stem from Edward Snowden's leaks, you're sorely mistaken. Today, we learn of a truly appalling effort that the NSA and its partners worked together on to intercept Android users' connections to install... Read more...
We reported a couple of weeks ago that GitHub was hit with a massive DDoS attack, and given the projects that were targeted; it was widely assumed that China was behind the attack. Now, there's even more evidence of that, and it appears that a brand-new weapon was used... Read more...
Lenovo said it's currently investigating a cyberattack that took the company's website down for several hours earlier this week, though it may not have to look very far. The ornery hacking group known as Lizard Squad is claiming responsibility for the security breach... Read more...
Earlier this month, it wasdiscoveredthatChinawas using man-in-the-middle (MITM) attacks against Microsoft Outlook and Mozilla Thunderbird email clients, as well as smartphone apps that use IMAP and SMTP protocols. Or did it? A spokesman for the... Read more...
China appears to be bringing the hammer down on American email services attempting to operate on its digital turf without officially banning them. The country briefly stole the cybervillian spotlight from North Korea last year when it allegedly crushed Gmail... Read more...
Making money while running a social media service is difficult. Companies like Facebook and Twitter have struggled to monetize their platforms on both desktop and mobile, while striking balances that don't royally tick off users with obnoxious advertising. But in a world where... Read more...
Prev 1 2 3 Next