The Hacker News — Most Popular Cyber Security, Hacking News Site: Man-in-the-Middle

Apple iCloud and Activation Lock Hacked; Allows Hackers to Unlock Stolen Devices

Apple iCloud and Activation Lock Hacked; Allows Hackers to Unlock Stolen Devices

May 21, 2014Swati Khandelwal
A Dutch-Moroccan team of hackers calling itself " Team DoulCi " have reportedly claimed to hack a protective feature on Apple ...
Pre-Play Vulnerability Allows Chip-and-PIN Payment Card Cloning

Pre-Play Vulnerability Allows Chip-and-PIN Payment Card Cloning

May 20, 2014Mohit Kumar
In March this year, we reported that the major card distributor companies, VISA and Mastercard are migrating to EMV chip cards , also kn...
Viber's Poor Data Security Practices Threaten Users' Privacy

Viber's Poor Data Security Practices Threaten Users' Privacy

April 23, 2014Swati Khandelwal
Last week we reported a critical vulnerability in the world's most popular messaging application WhatsApp, that could expose users’...
WhatsApp Flaw leaves User Location Vulnerable to Hackers and Spy Agencies

WhatsApp Flaw leaves User Location Vulnerable to Hackers and Spy Agencies

April 15, 2014Swati Khandelwal
If you are using WhatsApp to chit-chat with your friends or relatives, then you should be careful about sharing your location with them...
Google Public DNS Server Traffic Hijacked

Google Public DNS Server Traffic Hijacked

March 16, 2014Mohit Kumar
The Internet is becoming a dangerous place day-by-day and especially for those innocent web users who rely on 3rd party services. The la...
Twitter enables StartTLS for Secure Emails to prevent Snooping

Twitter enables StartTLS for Secure Emails to prevent Snooping

March 14, 2014Wang Wei
TWITTER is taking users' privacy and security very seriously and in an effort to prevent Government snooping, the company has secure...
Hacking Facebook User 'Access Token' with Man-in-the-Middle Attack

Hacking Facebook User 'Access Token' with Man-in-the-Middle Attack

March 11, 2014Wang Wei
Facebook has several security measures to protect users' account, such as a user " access token " is granted to the Facebo...
Apple's SSL Vulnerability might allow NSA to hack iOS Devices Remotely

Apple's SSL Vulnerability might allow NSA to hack iOS Devices Remotely

February 25, 2014Swati Khandelwal
Just two days before Apple has disclosed a critical Security flaw in the SSL implementation on the iOS software that would allow man-i...
'LinkedIn Intro' iOS app can read your emails in iPhone

'LinkedIn Intro' iOS app can read your emails in iPhone

October 25, 2013Mohit Kumar
Your LinkedIn profile is your digital resume. Yesterday, LinkedIn launched a new app for for iOS devices called Intro ' LinkedIn In...
BREACH decodes HTTPS encrypted data in 30 seconds

BREACH decodes HTTPS encrypted data in 30 seconds

August 03, 2013Mohit Kumar
A new hacking technique dubbed BREACH can extract login tokens, session ID numbers and other sensitive information from SSL/TLS encrypt...
T-Mobile Wi-Fi Calling App vulnerable to Man-in-the-Middle attack

T-Mobile Wi-Fi Calling App vulnerable to Man-in-the-Middle attack

March 22, 2013Mohit Kumar
T-Mobile devices having a default Wi-Fi Calling feature that keeps you connected in areas with little or no coverage using Wi-Fi connect...
Cyber security scenario according to WebSense

Cyber security scenario according to WebSense

March 11, 2013Anonymous
It's time of stocktaking, principal security firm are proposing their analysis to synthesize actual situation on cyber security, 201...
Dutch Hacker Sentenced for selling 100,000 credit cards

Dutch Hacker Sentenced for selling 100,000 credit cards

February 04, 2013Wang Wei
A Dutch hacker was sentenced to 12 years in a US prison on Friday for trafficking over 100,000 credit card numbers stolen in a computer h...
Fake Turkish digital Certificates blocked by Browser vendors

Fake Turkish digital Certificates blocked by Browser vendors

January 04, 2013Anonymous
It’s the news of the day, a fraudulent digital certificate that could be used for active phishing attacks against Google’s web propertie...
Facebook Camera App Vulnerable to Man in The Middle Attack

Facebook Camera App Vulnerable to Man in The Middle Attack

December 26, 2012Mohit Kumar
Egypt-based security researcher reported that Facebook Camera App for mobiles are Vulnerable to Man in The Middle Attack , that allow an ...
Etsy for iPhone loophole allows attacker to hijack Accounts

Etsy for iPhone loophole allows attacker to hijack Accounts

December 15, 2012Mohit Kumar
Mohamed Ramadan from Attack-Secure discovered a critical vulnerability in Etsy's iPhone application. Etsy is a social commerce websit...
Exclusive : Hacking Hotmail and Outlook accounts using Cookie reuse vulnerability

Exclusive : Hacking Hotmail and Outlook accounts using Cookie reuse vulnerability

December 14, 2012Mohit Kumar
This Friday I was working with my co-security researcher " Christy Philip Mathew " in +The Hacker News  Lab for testing the...
New U.S. drone hacked by IRAN ? Reality or propaganda?

New U.S. drone hacked by IRAN ? Reality or propaganda?

December 05, 2012Anonymous
It's known, drones are privileged vehicles for reconnaissance and attacks, technology has achieved level of excellence and their us...