searchtwitterarrow rightmail strokearrow leftmail solidfacebooklinkedinplusangle upmagazine plus
Help Net Security - Daily information security news with a focus on enterprise security.
Help Net Security - Daily information security news with a focus on enterprise security.
  • News
  • Features
  • Expert analysis
  • Videos
  • Reviews
  • Events
  • Whitepapers
  • Industry news
  • Product showcase
  • Newsletters

MITM

Get our top stories in your inbox

Multiple vulnerabilities discovered in smart home devices

April 22, 2020

ESET researchers found serious security vulnerabilities in three different home hubs: Fibaro Home Center Lite, HomeMatic Central Control Unit (CCU2) and eLAN-RF-003. Some of …

AWDL flaws open Apple users to tracking, MitM, malware planting

July 31, 2019

Vulnerabilities in Apple Wireless Direct Link (AWDL), the wireless protocol that underpins Apple’s AirPlay and AirDrop services, could allow attackers to track users in …

Who’s trying to eavesdrop on your customers’ encrypted mobile traffic?

August 20, 2018

The number one source of TLS/SSL Man in the Middle (MitM) attacks on encrypted mobile traffic are not corporate firewalls or captive portals used by hotels, airports and other …

Security company Fox-IT reveals, details MitM attack they suffered in September

December 15, 2017

Dutch IT security consultancy/service provider Fox-IT has revealed on Thursday that it has suffered a security breach, which resulted in some files and emails sent by the …

Bugs in Windows DNS client open millions of users to attack

October 10, 2017

In this month’s Patch Tuesday, Microsoft has included fixes for multiple critical memory corruption vulnerabilities in the Windows DNS client, which could be exploited …

Billions of Bluetooth-enabled devices vulnerable to new airborne attacks

September 13, 2017

Eight zero-day vulnerabilities affecting the Android, Windows, Linux and iOS implementations of Bluetooth can be exploited by attackers to extract information from, execute …

Password Reset MITM: Exposing the need for better security choices

June 23, 2017

Attackers that have set up a malicious site can use users’ account registration process to successfully perform a password reset process on a number of popular websites …

Lure10: Exploiting Wi-Fi Sense to MITM wireless Windows devices

April 26, 2017

Karma has long been a staple man-in-the-middle attack used in authorised wireless security assessments and unsanctioned ones, but as many modern operating systems now provide …

Over 2.8 million cheap Android smartphones come with preinstalled backdoor

November 21, 2016

If you’re using a cheap Android smartphone manufactured or sold by BLU, Infinix, Doogee, Leagoo, IKU, Beeline or Xolo, you are likely wide open to Man-in-the-Middle …

Kaspersky Safe Browser iOS app sports MITM SSL certificate bug

August 1, 2016

Security researcher David Coomber has unearthed a vulnerability (CVE-2016-6231) in the Kaspersky Safe Browser iOS app that effectively contradicts its name. As it turns out, …

UK banking customers targeted with Retefe Trojan with MitM capabilities

June 28, 2016

UK users are the latest targets of cyber crooks leveraging the Retefe banking Trojan and a rogue root certificate. The malware is out to steal online banking credentials of …

KeePass update check MitM flaw can lead to malicious downloads

June 2, 2016

Open source password manager KeePass sports a MitM vulnerability that could allow attackers to trick users into downloading malware disguised as a software update, security …

Posts navigation

1 2

Featured news

  • How organizations can keep themselves secure whilst cutting IT spending
  • Mounting pressure is creating a ticking time bomb for railway cybersecurity
  • ICS vulnerabilities: Insights from advisories, how CVEs are reported
Guide: How virtual CISOs can efficiently extend their services into compliance readiness

Sponsored

eBook: 4 ways to secure passwords, avoid corporate account takeover

Here’s the deal: Uptycs for all of 2023 for $1

2022 Cloud Data Security Report

Don't miss

How organizations can keep themselves secure whilst cutting IT spending

Mounting pressure is creating a ticking time bomb for railway cybersecurity

3 business application security risks businesses need to prepare for in 2023

Researchers release PoC exploit for critical Windows CryptoAPI bug (CVE-2022-34689)

Attackers use portable executables of remote management software to great effect

Cybersecurity news
Help Net Security - Daily information security news with a focus on enterprise security.
© Copyright 1998-2023 by Help Net Security
Read our privacy policy | About us | Advertise
Follow us