The Hacker News — Most Popular Cyber Security, Hacking News Site: man-in-the-middle attack

New Man-in-the-Disk attack leaves millions of Android phones vulnerable

New Man-in-the-Disk attack leaves millions of Android phones vulnerable

August 13, 2018Swati Khandelwal
Security researchers at Check Point Software Technologies have discovered a new attack vector against the Android operating system that coul...
Destructive and MiTM Capabilities of VPNFilter Malware Revealed

Destructive and MiTM Capabilities of VPNFilter Malware Revealed

June 06, 2018Swati Khandelwal
It turns out that the threat of the massive VPNFilter botnet malware that was discovered late last month is beyond what we initially tho...
Android Flaw Lets Hackers Inject Malware Into Apps Without Altering Signatures

Android Flaw Lets Hackers Inject Malware Into Apps Without Altering Signatures

December 08, 2017Mohit Kumar
Millions of Android devices are at serious risk of a newly disclosed critical vulnerability that allows attackers to secretly overwrite l...
Security Flaw Left Major Banking Apps Vulnerable to MiTM Attacks Over SSL

Security Flaw Left Major Banking Apps Vulnerable to MiTM Attacks Over SSL

December 07, 2017Swati Khandelwal
A team of security researchers has discovered a critical implementation flaw in major mobile banking applications that left banking crede...
Google to add "DNS over TLS" security feature to Android OS

Google to add "DNS over TLS" security feature to Android OS

October 22, 2017Mohit Kumar
No doubt your Internet Service Provides (ISPs), or network-level hackers cannot spy on https communications. But do you know — ISPs can...
All OnePlus Devices Vulnerable to Remote Attacks Due to 4  Unpatched Flaws

All OnePlus Devices Vulnerable to Remote Attacks Due to 4 Unpatched Flaws

May 11, 2017Swati Khandelwal
There is a bad news for all OnePlus lovers. A security researcher has discovered four vulnerabilities that affect all OnePlus handsets...
Wikileaks Unveils CIA's Man-in-the-Middle Attack Tool

Wikileaks Unveils CIA's Man-in-the-Middle Attack Tool

May 05, 2017Mohit Kumar
Wikileaks has published a new batch of the Vault 7 leak , detailing a man-in-the-middle (MitM) attack tool allegedly created by the United S...
New MacOS Malware, Signed With Legit Apple ID, Found Spying On HTTPS Traffic

New MacOS Malware, Signed With Legit Apple ID, Found Spying On HTTPS Traffic

April 27, 2017Swati Khandelwal
Many people believe that they are much less likely to be bothered by malware if they use a Mac computer, but is it really true? Unfortuna...
Explained — What's Up With the WhatsApp 'Backdoor' Story?

Explained — What's Up With the WhatsApp 'Backdoor' Story?

January 14, 2017Mohit Kumar
What is a backdoor? By definition: "Backdoor is a feature or defect of a computer system that allows surreptitious unauthorized ac...
WhatsApp Backdoor allows Hackers to Intercept and Read Your Encrypted Messages

WhatsApp Backdoor allows Hackers to Intercept and Read Your Encrypted Messages

January 13, 2017Mohit Kumar
Important Update — Most Security Experts argued, " It's not a backdoor, rather it’s a feature ," but none of them denied the f...
This $5 Device Can Hack your Password-Protected Computers in Just One Minute

This $5 Device Can Hack your Password-Protected Computers in Just One Minute

November 16, 2016Swati Khandelwal
You need to be more careful next time while leaving your computer unattended at your office, as it cost hackers just $5 and only 30 sec...
Firefox Browser vulnerable to Man-in-the-Middle Attack

Firefox Browser vulnerable to Man-in-the-Middle Attack

September 18, 2016Mohit Kumar
A critical vulnerability resides in the fully-patched version of the Mozilla's Firefox browser that could allow well-resourced attack...
How Certificate Transparency Monitoring Tool Helped Facebook Early Detect Duplicate SSL Certs

How Certificate Transparency Monitoring Tool Helped Facebook Early Detect Duplicate SSL Certs

April 11, 2016Mohit Kumar
Earlier this year, Facebook came across a bunch of duplicate SSL certificates for some of its own domains and revoked them immediately ...
Warning — Hackers can Silently Install Malware to Non-Jailbroken iOS Devices

Warning — Hackers can Silently Install Malware to Non-Jailbroken iOS Devices

March 16, 2016Mohit Kumar
Hard time for mobile phone users! Just recently, two severe vulnerabilities in Qualcomm Snapdragon chip and Stagefright were spotted...
NASA HACKED! AnonSec tried to Crash $222 Million Drone into Pacific Ocean

NASA HACKED! AnonSec tried to Crash $222 Million Drone into Pacific Ocean

February 02, 2016Rakesh Krishnan
Once again the Red Alarm had been long wailed in the Security Desk of the National Aeronautics and Space Administration ( NASA ). ...