Gmail for iOS Poses Man-in-the-Middle Attack Risk

Gmail for iOS Poses Man-in-the-Middle Attack Risk

Lack of certificate pinning in mobile apps could be leveraged by cybercriminals

LinkedIn Info Can Be Stolen via MitM Attack, Zimperium CEO Says

LinkedIn Info Can Be Stolen via MitM Attack, Zimperium CEO Says

Incomplete SSL rollout poses security risks to LinkedIn users outside the US and Europe

Banker Trojan Bypasses SSL Mechanism

Banker Trojan Bypasses SSL Mechanism

Uses man-in-the-middle approach to view unencrypted traffic

Hosts Still Open to Attack Through OpenSSL Vulnerability

Hosts Still Open to Attack Through OpenSSL Vulnerability

Test tool available for checking if server is vulnerable

Wi-Fi Spots and Malicious Chargers

Wi-Fi Spots and Malicious Chargers

Avoid untrusted or unknown charging points and Wi-Fi networks

Experts Find Vulnerabilities in RSA Conference 2014 Android Application

Experts Find Vulnerabilities in RSA Conference 2014 Android Application

The names, companies and titles of all registered users are exposed

Samsung Says MitM Attacks Against Knox Can Be Easily Mitigated

Samsung Says MitM Attacks Against Knox Can Be Easily Mitigated

What BGU researchers have found are not vulnerabilities in Knox, or Android

Hackers Target Bitcoin Talk via Vulnerability in AnonymousSpeech Registrar

Hackers Target Bitcoin Talk via Vulnerability in AnonymousSpeech Registrar

Passwords, authentication cookies and PMs possibly compromised

European Parliament’s Public Wi-Fi Targeted in Cyberattack, Emails Possibly Hacked

European Parliament’s Public Wi-Fi Targeted in Cyberattack, Emails Possibly Hacked

The public Wi-Fi network has been shut down while the incident is investigated

Man-in-the-Middle Attack Launched Against Chinese Users Trying to Access GitHub

Man-in-the-Middle Attack Launched Against Chinese Users Trying to Access GitHub

The attacks appear to be linked to a petition created on WhiteHouse.gov

Nokia Found to Perform Man-in-the-Middle Attacks on HTTPS Traffic

Nokia Found to Perform Man-in-the-Middle Attacks on HTTPS Traffic

The company says it's not collecting any sensitive information from users

TURKTRUST Incident Shows That Certificate-Based Attacks Are a Preferred Vector

TURKTRUST Incident Shows That Certificate-Based Attacks Are a Preferred Vector

Experts from Venafi and Sophos share some valuable insight on the matter

Flaw in Facebook Camera for iOS Allowed Hackers to Hijack Accounts

Flaw in Facebook Camera for iOS Allowed Hackers to Hijack Accounts

The company addressed the issue after being notified by Mohamed Ramadan

Cybercriminals Turn To Universal Man in the Browser Attacks to Steal Valuable Data [Video]

Cybercriminals Turn To Universal Man in the Browser Attacks to Steal Valuable Data [Video]

Fraudsters can target the information entered by a victim on all websites

Expert: Firms’ Inability to Fend Off MitM Attacks Allows Crooks to Steal Billions

Expert: Firms’ Inability to Fend Off MitM Attacks Allows Crooks to Steal Billions

A phishing scheme recently busted by the FBI is a perfect example

 
Want more? Browse: