Researchershave found a vulnerability in a popular C standard library in IoT products that could allow attackers to perform DNS poisoning…
Tag: mitm
Intercepting 2FA: Over 1200 man-in-the-middle phishing toolkits detected
Two-factor authentication (2FA) has been around for a while now and for the majority of tech users in the US and…
Chrome casts away the padlock—is it good riddance or farewell?
It’s been an interesting journey for security messaging where browsers are concerned. Back in the day, many of the websites you’d…
Bluetooth vulnerability can be exploited in Key Negotiation of Bluetooth (KNOB) attacks
Those who are familiar with Bluetooth BR/EDR technology (aka Bluetooth Classic, from 1.0 to 5.1) can attest that it is not…
Vulnerabilities in financial mobile apps put consumers and businesses at risk
Security hubris. It’s the phrase we use to refer to our feeling of confidence grounded on assumptions we all have (but…
Of hoodies and headphones: a spotlight on risks surrounding audio output devices
More than a decade ago, cardiologists from the Beth Israel Medical Center in Boston presented their findings at the American Heart…
Mac malware intercepts encrypted web traffic for ad injection
Last week, Malwarebytes researcher Adam Thomas found an interesting new piece of Mac malware that exhibits some troubling behaviors, including intercepting…
A week in security (July 9 – July 15)
Last week, we talked about domestic abuse fuelled by IoT, doing threat intel programs right, blocking ICO fraud, and man-in-the-middle attacks….
When three isn’t a crowd: Man-in-the-Middle (MitM) attacks explained
Gone are the days when eavesdropping is just the stuff of spies and the town gossip. In fact, it has evolved…