The Hacker News Logo
Subscribe to Newsletter

The Hacker News – Most Popular Cyber Security, Hacking News Site: man-in-the-middle attack

Kazakhstan makes it Mandatory for its Citizens to Install Internet Backdoor

Kazakhstan makes it Mandatory for its Citizens to Install Internet Backdoor

December 03, 2015Mohit Kumar
Next in the queue, Kazakhstan is also planning to Spy on encrypted Internet Traffic of its citizens, but in the most shameless way. ...
How Hackers Can Hack Your Chip-and-PIN Credit Cards

How Hackers Can Hack Your Chip-and-PIN Credit Cards

October 20, 2015Khyati Jain
October 1, 2015, was the end of the deadline for U.S. citizens to switch to Chip-enabled Credit Cards for making the transactions throu...
Exploiting Browser Cookies to Bypass HTTPS and Steal Private Information

Exploiting Browser Cookies to Bypass HTTPS and Steal Private Information

September 25, 2015Swati Khandelwal
A newly discovered critical flaw in the implementation of web cookies by major browsers could open secured (HTTPS) browsing to Man-in-th...
Windows Updates Can be Intercepted to Inject Malware into Corporate Networks

Windows Updates Can be Intercepted to Inject Malware into Corporate Networks

August 07, 2015Khyati Jain
If you think that the patches delivered through Windows update can not be laced with malware, think again. Security researchers have...
Critical SSL Vulnerability Leaves 25,000 iOS Apps Vulnerable to Hackers

Critical SSL Vulnerability Leaves 25,000 iOS Apps Vulnerable to Hackers

April 25, 2015Mohit Kumar
A critical vulnerability resides in AFNetworking could allow an attacker to cripple the HTTPS protection of 25,000 iOS apps available in...
18-year-old Unpatched Vulnerability Affects All Versions of Microsoft Windows

18-year-old Unpatched Vulnerability Affects All Versions of Microsoft Windows

April 13, 2015Swati Khandelwal
Security researchers have unearthed a serious security flaw in all supported versions of Windows that could let hackers steal users’ cr...
'Google VPN' in-built Hidden Service spotted in Android 5.1

'Google VPN' in-built Hidden Service spotted in Android 5.1

March 15, 2015Wang Wei
Good news for all Android Lollipop-ers! Google appears to be secretly working on a Virtual Private Network (VPN) service, dubbed '...
'FREAK' — New SSL/TLS Vulnerability Explained

'FREAK' — New SSL/TLS Vulnerability Explained

March 03, 2015Mohit Kumar
Another new widespread and disastrous SSL/TLS vulnerability has been uncovered that for over a decade left Millions of users of Apple an...
Lenovo Admits and Released an Automatic Superfish Removal Tool

Lenovo Admits and Released an Automatic Superfish Removal Tool

February 22, 2015Swati Khandelwal
The computer giant Lenovo has released a tool to remove the dangerous "SuperFish" adware program that the company had pre-installe...
Lenovo Shipping PCs with Pre-Installed 'Superfish Malware' that Kills HTTPS

Lenovo Shipping PCs with Pre-Installed 'Superfish Malware' that Kills HTTPS

February 19, 2015Swati Khandelwal
One of the most popular computer manufacturers Lenovo is being criticized for selling laptops pre-installed with invasive marketing soft...
Gogo In-flight Internet issues Fake SSL Certificates to its own Customers

Gogo In-flight Internet issues Fake SSL Certificates to its own Customers

January 06, 2015Swati Khandelwal
Gogo — one of the largest providers of in-flight Internet service — has been caught issuing fake SSL certificates, allowing the infligh...
DoubleDirect MitM Attack Targets Android, iOS and OS X Users

DoubleDirect MitM Attack Targets Android, iOS and OS X Users

November 22, 2014Wang Wei
Security researchers have discovered a new type of "Man-in-the-Middle" (MitM) attack in the wild targeting smartphone and tab...
Google Releases 'nogotofail' Network Traffic Security Testing Tool

Google Releases 'nogotofail' Network Traffic Security Testing Tool

November 05, 2014Wang Wei
Google introduced a new security tool to help developers detect bugs and security glitches in the network traffic security that may leav...
Google Launches USB-Based "Security Key" To Strengthen 2-Step Verification

Google Launches USB-Based "Security Key" To Strengthen 2-Step Verification

October 21, 2014Swati Khandelwal
Google is taking its users’ privacy very serious and making every possible effort for its users just to make them feel secure when they ...
Chinese Government Executes MITM Attack against iCloud

Chinese Government Executes MITM Attack against iCloud

October 20, 2014Mohit Kumar
Apple iCloud users in China are not safe from the hackers — believed to be working for Chinese government — who are trying to wiretap Ap...
POODLE SSL 3.0 Attack Exploits Widely-used Web Encryption Standard

POODLE SSL 3.0 Attack Exploits Widely-used Web Encryption Standard

October 14, 2014Wang Wei
Another Heartbleed-like vulnerability has been discovered in the decade old but still widely used Secure Sockets Layer ( SSL ) 3.0 cryptogra...
Privacy-focused Tails 1.1.2 Operating System Released

Privacy-focused Tails 1.1.2 Operating System Released

September 28, 2014Wang Wei
Tails , a Linux-based highly secure Operating System specially designed and optimized to preserve users' anonymity and privacy, has laun...
Best Deals

Get Daily News Updates By Email

Join over 500,000 information security professionals — Get the best of our cyber security coverage delivered to your inbox every morning.