- Security
- By Ionut Ilascu
- July 10th, 2014
Gmail for iOS Poses Man-in-the-Middle Attack Risk
Lack of certificate pinning in mobile apps could be leveraged by cybercriminals
- Security
- By Ionut Ilascu
- June 19th, 2014
LinkedIn Info Can Be Stolen via MitM Attack, Zimperium CEO Says
Incomplete SSL rollout poses security risks to LinkedIn users outside the US and Europe
- Virus alerts
- By Ionut Ilascu
- June 16th, 2014
Banker Trojan Bypasses SSL Mechanism
Uses man-in-the-middle approach to view unencrypted traffic
- Security Blog
- By Ionut Ilascu
- June 16th, 2014
Hosts Still Open to Attack Through OpenSSL Vulnerability
Test tool available for checking if server is vulnerable
- Advisories
- By Ionut Ilascu
- June 12th, 2014
Wi-Fi Spots and Malicious Chargers
Avoid untrusted or unknown charging points and Wi-Fi networks
- Security Fixes and Improvements
- By Eduard Kovacs
- February 28th, 2014
Experts Find Vulnerabilities in RSA Conference 2014 Android Application
The names, companies and titles of all registered users are exposed
- Security Fixes and Improvements
- By Eduard Kovacs
- January 10th, 2014
Samsung Says MitM Attacks Against Knox Can Be Easily Mitigated
What BGU researchers have found are not vulnerabilities in Knox, or Android
- Hacking News
- By Eduard Kovacs
- December 2nd, 2013
Hackers Target Bitcoin Talk via Vulnerability in AnonymousSpeech Registrar
Passwords, authentication cookies and PMs possibly compromised
- Security Blog
- By Eduard Kovacs
- November 27th, 2013
European Parliament’s Public Wi-Fi Targeted in Cyberattack, Emails Possibly Hacked
The public Wi-Fi network has been shut down while the incident is investigated
- Security Blog
- By Eduard Kovacs
- January 31st, 2013
Man-in-the-Middle Attack Launched Against Chinese Users Trying to Access GitHub
The attacks appear to be linked to a petition created on WhiteHouse.gov
- Security Fixes and Improvements
- By Eduard Kovacs
- January 11th, 2013
Nokia Found to Perform Man-in-the-Middle Attacks on HTTPS Traffic
The company says it's not collecting any sensitive information from users
- Advisories
- By Eduard Kovacs
- January 4th, 2013
TURKTRUST Incident Shows That Certificate-Based Attacks Are a Preferred Vector
Experts from Venafi and Sophos share some valuable insight on the matter
- Security Fixes and Improvements
- By Eduard Kovacs
- December 27th, 2012
Flaw in Facebook Camera for iOS Allowed Hackers to Hijack Accounts
The company addressed the issue after being notified by Mohamed Ramadan
- Virus alerts
- By Eduard Kovacs
- October 5th, 2012
Cybercriminals Turn To Universal Man in the Browser Attacks to Steal Valuable Data [Video]
Fraudsters can target the information entered by a victim on all websites
- Advisories
- By Eduard Kovacs
- May 10th, 2012
Expert: Firms’ Inability to Fend Off MitM Attacks Allows Crooks to Steal Billions
A phishing scheme recently busted by the FBI is a perfect example