searchtwitterarrow rightmail strokearrow leftmail solidfacebooklinkedinplusangle upmagazine plus
Help Net Security - Daily information security news with a focus on enterprise security.
Help Net Security - Daily information security news with a focus on enterprise security.
  • News
  • Features
  • Expert analysis
  • Videos
  • Reviews
  • Events
  • Whitepapers
  • Industry news
  • Product showcase
  • Newsletters

MITM

Get our top stories in your inbox

Popular fintech apps expose valuable, exploitable secrets

March 6, 2023

92% of the most popular banking and financial services apps contain easy-to-extract secrets and vulnerabilities that can let attackers steal consumer data and finances, …

Multiple vulnerabilities discovered in smart home devices

April 22, 2020

ESET researchers found serious security vulnerabilities in three different home hubs: Fibaro Home Center Lite, HomeMatic Central Control Unit (CCU2) and eLAN-RF-003. Some of …

AWDL flaws open Apple users to tracking, MitM, malware planting

July 31, 2019

Vulnerabilities in Apple Wireless Direct Link (AWDL), the wireless protocol that underpins Apple’s AirPlay and AirDrop services, could allow attackers to track users in …

Who’s trying to eavesdrop on your customers’ encrypted mobile traffic?

August 20, 2018

The number one source of TLS/SSL Man in the Middle (MitM) attacks on encrypted mobile traffic are not corporate firewalls or captive portals used by hotels, airports and other …

Security company Fox-IT reveals, details MitM attack they suffered in September

December 15, 2017

Dutch IT security consultancy/service provider Fox-IT has revealed on Thursday that it has suffered a security breach, which resulted in some files and emails sent by the …

Bugs in Windows DNS client open millions of users to attack

October 10, 2017

In this month’s Patch Tuesday, Microsoft has included fixes for multiple critical memory corruption vulnerabilities in the Windows DNS client, which could be exploited …

Billions of Bluetooth-enabled devices vulnerable to new airborne attacks

September 13, 2017

Eight zero-day vulnerabilities affecting the Android, Windows, Linux and iOS implementations of Bluetooth can be exploited by attackers to extract information from, execute …

Password Reset MITM: Exposing the need for better security choices

June 23, 2017

Attackers that have set up a malicious site can use users’ account registration process to successfully perform a password reset process on a number of popular websites …

Lure10: Exploiting Wi-Fi Sense to MITM wireless Windows devices

April 26, 2017

Karma has long been a staple man-in-the-middle attack used in authorised wireless security assessments and unsanctioned ones, but as many modern operating systems now provide …

Over 2.8 million cheap Android smartphones come with preinstalled backdoor

November 21, 2016

If you’re using a cheap Android smartphone manufactured or sold by BLU, Infinix, Doogee, Leagoo, IKU, Beeline or Xolo, you are likely wide open to Man-in-the-Middle …

Kaspersky Safe Browser iOS app sports MITM SSL certificate bug

August 1, 2016

Security researcher David Coomber has unearthed a vulnerability (CVE-2016-6231) in the Kaspersky Safe Browser iOS app that effectively contradicts its name. As it turns out, …

UK banking customers targeted with Retefe Trojan with MitM capabilities

June 28, 2016

UK users are the latest targets of cyber crooks leveraging the Retefe banking Trojan and a rogue root certificate. The malware is out to steal online banking credentials of …

Posts navigation

1 2

Featured news

  • How APTs target SMBs
  • Kali Linux 2023.2 released: New tools, a pre-built Hyper-V image, a new audio stack, and more!
  • The strategic importance of digital trust for modern businesses
Spin Up A CIS Hardened Image

Sponsored

The best defense against cyber threats for lean security teams

Webinar: Tips from MSSPs to MSSPs – starting a vCISO practice

Security in the cloud with more automation

CISOs struggle with stress and limited resources

Don't miss

How APTs target SMBs

Kali Linux 2023.2 released: New tools, a pre-built Hyper-V image, a new audio stack, and more!

The strategic importance of digital trust for modern businesses

Managing mental health in cybersecurity

Attackers hacked Barracuda ESG appliances via zero-day since October 2022

Cybersecurity news
Help Net Security - Daily information security news with a focus on enterprise security.
© Copyright 1998-2023 by Help Net Security
Read our privacy policy | About us | Advertise
Follow us