73 Results for

man-in-the-middle attacks

Article

Firefox extension protects against man-in-the-middle attacks

New software helps guide users to safe Web sites and away from malicious sites, without being confused by an error message Firefox displays for many Web sites that don't pay third-parties to verify their security.

By August 26, 2008

Article

NSA system designed to attack 'millions' of computers -- report

The US government designed computerized hacking tools to automate the process of compromising computers with attacks that let it harvest data before it is encrypted, new documents show.

By March 12, 2014

Article

Internet-scale 'man in the middle' attack disclosed

This post initially misstated the meaning in this context of ASN. It stands for Autonomous System Notation.

By October 17, 2008

Article

Internet-scale 'man in the middle' attack disclosed

A researcher has found a nearly invisible way to redirect network traffic through an attacker's network using existing network protocols.

By October 17, 2008

Article

Google, Yahoo, Skype targeted in attack linked to Iran

Ingenious attack traced to Iranian networks led to fraudulent digital certificates that could impersonate major Web sites including Google, Yahoo, and Skype.

By March 23, 2011

Article

E-voting machines vulnerable to remote vote changing

Researchers say they suspect Diebold machines aren't the only ones susceptible to simple man-in-the-middle attacks.

By September 28, 2011

Article

Google Desktop vulnerable to attack

Although rare, a sophisticated attacker could perform a man-in-the-middle attack using Google Desktop.

By June 4, 2007

Article

Popular add-ons to Firefox are the latest criminal attack vector

Popular add-ons could have their update process hijacked by man-in-the-middle attacks.

By May 30, 2007

Article

Apple plugs holes for domain spoofing, other attacks

Security update for Mac OS X addresses 43 specific issues, including holes that could allow an attacker to take over the computer.

By November 9, 2009

Article

VoIP system users can be targeted in attacks

A researcher finds a way to intercept specific extensions on a corporate phone network.

By September 26, 2008