What is a Man-in-the-Middle Attack? Detection and Prevention Tips

A man in the middle attack (MITM attack) is executed when a hacker secretly intercepts an online communication. The attacker can silently eavesdrop on the conversation, steal information, or alter the content of.
The post What is a Man-in-the-Middle At… Continue reading What is a Man-in-the-Middle Attack? Detection and Prevention Tips

LTE vulnerability allows impersonation of other mobile devices

Researchers have found a way to impersonate mobile devices on 4G and 5G mobile networks, and are calling on operators and standards bodies to fix the flaw that caused it. Continue reading LTE vulnerability allows impersonation of other mobile devices

‘Ultimate’ MiTM Attack Steals $1M from Israeli Startup

Researchers uncovers “ultimate man-in-the-middle attack” that used an elaborate spoofing campaign to fool a Chinese VC firm and rip off an emerging business. Continue reading ‘Ultimate’ MiTM Attack Steals $1M from Israeli Startup

Orchestrating Network Security to Handle Cyberthreats

Unfortunately for companies, cybercriminals don’t need to invent the wheel when choosing a way to hack corporate networks. Black hat hackers have a choice of cyberthreats and attack methods on a silver platter. Nevertheless, certain types of cybercrim… Continue reading Orchestrating Network Security to Handle Cyberthreats

Google recalls Titan Bluetooth keys after finding security flaw

Google had egg on its face this week after it had to recall some of its Titan hardware security keys for being insecure. Continue reading Google recalls Titan Bluetooth keys after finding security flaw

Insecure UC Browser ‘Feature’ Lets Hackers Hijack Android Phones Remotely

Beware! If you are using UC Browser on your smartphones, you should consider uninstalling it immediately.

Why? Because the China-made UC Browser contains a “questionable” ability that could be exploited by remote attackers to automatically download an… Continue reading Insecure UC Browser ‘Feature’ Lets Hackers Hijack Android Phones Remotely