Vulnerabilities

Firefox Browser vulnerable to Man-in-the-Middle Attack

A critical vulnerability resides in the fully-patched version of the Mozilla’s Firefox browser that could allow well-resourced attackers to launch man-in-the-middle (MITM) impersonation attacks and also affects the Tor anonymity network. The Tor Project patched the issue in the browser’s HTTPS certificate pinning system on Friday with the release of its Tor Browser version 6.0.5, […]

Firefox Browser vulnerable to Man-in-the-Middle Attack Read More »

Typo error prevents hackers from stealing 1billion from a bank

Typo error prevents hackers from stealing $ 1 Billion from a bank spelling error stopped a hack from committing a billion dollar bank robbery A spelling mistake in an online bank transfer instruction became the source of resistance as it prevented nearly $1 billion robbery last month, Bangladesh central bank and the New York Fed,

Typo error prevents hackers from stealing 1billion from a bank Read More »

Million dollar bounty for iOS 9 Vulnerability

Million dollar bounty for iOS 9 Vulnerability ZERODIUM, a premium zero-day acquisition platform, today announced the biggest zero-day bug bounty program: The Million Dollar iOS 9 Bug Bounty. As the name suggests, the bounty program is targeted towards iOS 9, which is widely considered as among the most secure mobile platforms out there. ZERODIUM says

Million dollar bounty for iOS 9 Vulnerability Read More »

How does satellite internet hijacking work

How does satellite internet hijacking work To attack satellite-based Internet connections, both the legitimate users of these links as well as the attackers’ own satellite dishes point to the specific satellite that is broadcasting the traffic. The attackers abuse the fact that the packets are unencrypted. Once an IP address that is routed through the

How does satellite internet hijacking work Read More »