man-in-the-middle

Pre-Loaded Lenovo Software Leaves PCs Vulnerable to Attack

Lenovo has revealed that a vast number of its PCs that have Accelerator Application pre-installed are vulnerable to attack and has advised owners to uninstall the software ...

June 4, 2016 at 9:00 am by

Gmail Says Use of Encrypted Emails Has Risen 25%

We use email every day, be it sending them for work or personal reasons or getting a thousand and one emails advertising everything from something you are interested in ...

March 27, 2016 at 6:15 am by

Logjam Can Hijack Your HTTPS Connections

There are a lot of techniques involving malware, trojans or other sort of attacks, but this one seems to affect the common and widely used HTTPS protocol, making it more ...

May 21, 2015 at 11:58 am by

Credentials May Become Compromised via Old Windows Vulnerability from the ’90s

Nobody wants their private information shared on the internet, but we live in an era where everything that’s connected to the internet may eventually become public. This ...

April 14, 2015 at 10:44 am by

Hackers Using New Phishing Technique to Exploit Router Flaws

There have been a number of unusual hacking techniques employed in Brazil recently. A group of hackers have used a “novel approach” to pull off a pharming attack ...

February 28, 2015 at 2:58 pm by

Hackers Target E-Banking Users By Exploiting Router Vulnerabilities To Hijack the DNS

There have been reports about critical vulnerabilities in a variety of routers, including Cisco, TP-Link, ASUS, TENDA and Netgear among others, all of which can be found in a ...

February 11, 2014 at 2:30 am by

  • Be Social with eTeknix

  • itvpros.com
  • Poll

    Do you like RGB?

    View Results