This $5 Device Can Hack your Password-Protected Computers in Just One Minute

You need to be more careful next time while leaving your computer unattended at your office, as it cost hackers just $5 and only 30 seconds to hack into any computer.

Well-known hardware hacker Samy Kamkar has once again devised a cheap exploit tool, … Continue reading This $5 Device Can Hack your Password-Protected Computers in Just One Minute

mitmproxy – Intercepting HTTP Proxy Tool aka MITM

mitmproxy is an interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers. It’s a console tool that allows interactive examination and modification of HTTP traffic. It differs from mitmdump in that all flows are kept in memory, which means that it’s intended for taking and manipulating small-ish samples. The…

Read the full post at darknet.org.uk

Continue reading mitmproxy – Intercepting HTTP Proxy Tool aka MITM

Firefox Browser vulnerable to Man-in-the-Middle Attack

A critical vulnerability resides in the fully-patched version of the Mozilla’s Firefox browser that could allow well-resourced attackers to launch man-in-the-middle (MITM) impersonation attacks and also affects the Tor anonymity network.

The Tor Proje… Continue reading Firefox Browser vulnerable to Man-in-the-Middle Attack

TCP Flaw in Linux Extends to 80 Percent of Android Devices

Researchers at Lookout said that 80 percent of Android devices remain vulnerable to a critical Linux vulnerability disclosed last week. Continue reading TCP Flaw in Linux Extends to 80 Percent of Android Devices

Lenovo Tells Users to Uninstall Vulnerable Updater

An advisory from PC maker Lenovo recommends that users uninstall Lenovo Accelerator Application, which includes components rife with security vulnerabilities. Continue reading Lenovo Tells Users to Uninstall Vulnerable Updater

Bloatware Insecurity Continues to Haunt Consumer, Business Laptops

High-severity vulnerabilities were found in pre-installed software updaters present in consumer and business laptops from vendors such as Dell, HP, Lenovo, Asus and Acer. Continue reading Bloatware Insecurity Continues to Haunt Consumer, Business Laptops

How Certificate Transparency Monitoring Tool Helped Facebook Early Detect Duplicate SSL Certs

Earlier this year, Facebook came across a bunch of duplicate SSL certificates for some of its own domains and revoked them immediately with the help of its own Certificate Transparency Monitoring Tool service.

Digital certificates are the backbone of our secure Internet, which protects sensitive information and communication, as well as authenticate systems and Internet users.

The

Continue reading How Certificate Transparency Monitoring Tool Helped Facebook Early Detect Duplicate SSL Certs

SideStepper Allows for MiTM Between iOS Devices, MDM Tools

Check Point has discovered a weakness that allows hackers to use phishing to carry out man-in-the-middle attacks between iOS devices and mobile device management tools and allow an attacker to push malicious apps to devices. Continue reading SideStepper Allows for MiTM Between iOS Devices, MDM Tools