man-in-the-middle

Pre-Loaded Lenovo Software Leaves PCs Vulnerable to Attack

Lenovo has revealed that a vast number of its PCs that have Accelerator Application pre-installed are vulnerable to attack and…

8 years ago

Gmail Says Use of Encrypted Emails Has Risen 25%

We use email every day, be it sending them for work or personal reasons or getting a thousand and one…

8 years ago

Logjam Can Hijack Your HTTPS Connections

There are a lot of techniques involving malware, trojans or other sort of attacks, but this one seems to affect…

9 years ago

Credentials May Become Compromised via Old Windows Vulnerability from the ’90s

Nobody wants their private information shared on the internet, but we live in an era where everything that's connected to…

9 years ago

Hackers Using New Phishing Technique to Exploit Router Flaws

There have been a number of unusual hacking techniques employed in Brazil recently. A group of hackers have used a…

9 years ago

Hackers Target E-Banking Users By Exploiting Router Vulnerabilities To Hijack the DNS

There have been reports about critical vulnerabilities in a variety of routers, including Cisco, TP-Link, ASUS, TENDA and Netgear among…

10 years ago