Security News
A vulnerability in Web Proxy Auto-Discovery (WPAD), a protocol used to ensure all systems in an organization utilize the same web proxy configuration, can be exploited to mount MitM attacks from...
Check Point has discovered a weakness that allows hackers to use phishing to carry out man-in-the-middle attacks between iOS devices and mobile device management tools and allow an attacker to...
All Samsung laptop owners are being urged to update their Windows PCs immediately after the discovery of a vulnerability that can allow remote attackers to download files onto a targeted system...
Intel has fixed a remotely exploitable vulnerability (CVE-2016-1493) in the Intel Driver Update Utility which could be used by a man-in-the-middle attacker to corrupt transferred data, which could lea...
A vulnerability in Cisco's Jabber client for Windows can be exploited by attackers to wiretap communications, steal user credentials, and to tamper with messages sent between the client and the Jabber...