Most people hate typing long messages while chatting on messaging apps, but thanks to voice recording feature provided by WhatsApp and Facebook Messenger, which makes it much easier for users to send longer messages that generally includes a lot of typing effort.
If you too have a habit of sending audio clip, instead of typing long messages, to your friends over Facebook Messenger, you are
Posted in Facebook Messenger, facebook security, hack facebook messenger, Hacking Facebook account, http strict transport security, man-in-the-middle attack, ssl security, ssl strip attack | Comments (0)
A critical vulnerability resides in the fully-patched version of the Mozilla’s Firefox browser that could allow well-resourced attackers to launch man-in-the-middle (MITM) impersonation attacks and also affects the Tor anonymity network.
The Tor Project patched the issue in the browser’s HTTPS certificate pinning system on Friday with the release of its Tor Browser version 6.0.5, while
Posted in addons, browser security, Firefox, Firefox plugin, hacking news, man-in-the-middle attack, Mozilla Firefox, mozilla security, tor browser | Comments (0)
An advisory from PC maker Lenovo recommends that users uninstall Lenovo Accelerator Application, which includes components rife with security vulnerabilities.
Posted in bloatware, Duo Labs, Lenovo, Lenovo Accelerator Application, lenovo laptops, Lenovo notebooks, Lenovo updater, Lenovo vulnerabilities, local network access, man-in-the-middle attack, remote code execution, vulnerabilities, Web Security, Windows 10 | Comments (0)
A ‘Serious’ security vulnerability has been discovered and fixed in OpenSSH – one of the most widely used open-source implementations of the Secure Shell (SSH) Protocol.
The critical vulnerability could be exploited by hackers to force clients to leak their secret private cryptographic keys, potentially exposing users to Man-in-the-Middle (MITM) attacks.
What Causes the Flaw to occur?
Posted in encryption keys, hacking news, hacking server, man-in-the-middle attack, OpenSSH, patch update, server security, steal crypto keys, Vulnerability | Comments (0)
A number of issues exist in the content management system Drupal that could lead to code execution and the theft of database credentials via a man-in-the-middle attack, a researcher warns.
Posted in Acquia, CSRF vulnerabilities, Drupal, IOActive, man-in-the-middle attack, MitM attack, vulnerabilities, Web Security | Comments (0)
October 1, 2015, was the end of the deadline for U.S. citizens to switch to Chip-enabled Credit Cards for making the transactions through swipe cards safer.
Now, a group of French forensics researchers have inspected a real-world case in which criminals played smart in such a way that they did a seamless chip-switching trick with a slip of plastic that it was identical to a normal credit
Posted in Chip-and-PIN, credit card fraud, credit card hacking, EMV chip cards, hack credit card, hacking news, identity theft, man-in-the-middle attack, Point-of-sale system | Comments (0)
IOActive researchers disclosed details on three patched vulnerabilities in Lenovo’s System Update mechanism.
Posted in certificate validation, Featured, IOActive, Lenovo, man-in-the-middle attack, Michael Milvich, phony certificates, privilege escalation, Rob Graham, Sofiane Talmat, Superfish, System Update vulnerabilities, vulnerabilities, Web Security | Comments (0)