The makers of the popular messaging app Confide said Wednesday it has patched multiple security vulnerabilities that could have allowed hackers to intercept messages sent using its secure end-to-end messaging platform.
Tag Archives: man-in-the-middle attack
Many Android VPN Apps Breaking Privacy Promises
Academics studying 283 Android VPN apps quantified a number of problems associated with native platform support for VPN clients through the BIND_VPN_SERVICE.
Simple Hack Lets Hackers Listen to Your Facebook Voice Messages Sent Over Chat
Most people hate typing long messages while chatting on messaging apps, but thanks to voice recording feature provided by WhatsApp and Facebook Messenger, which makes it much easier for users to send longer messages that generally includes a lot of typing effort.
If you too have a habit of sending audio clip, instead of typing long messages, to your friends over Facebook Messenger, you are
Explained — What's Up With the WhatsApp 'Backdoor' Story? Feature or Bug!
What is a backdoor?
By definition: “Backdoor is a feature or defect of a computer system that allows surreptitious unauthorized access to data, ” either the backdoor is in encryption algorithm, a server or in an implementation, and doesn’t matter whether it has previously been used or not.
Yesterday, we published a story based on findings reported by security researcher Tobias Boelter that
WhatsApp Backdoor allows Hackers to Intercept and Read Your Encrypted Messages
Most people believe that end-to-end encryption is the ultimate way to protect your secret communication from snooping, and it does, but it can be intercepted if not implemented correctly.
After introducing “end-to-end encryption by default” last year, WhatsApp has become the world’s largest secure messaging platform with over a billion users worldwide.
But if you think your conversations are
This $5 Device Can Hack your Password-Protected Computers in Just One Minute
You need to be more careful next time while leaving your computer unattended at your office, as it cost hackers just $5 and only 30 seconds to hack into any computer.
Well-known hardware hacker Samy Kamkar has once again devised a cheap exploit tool, this time that takes just 30 seconds to install a privacy-invading backdoor into your computer, even if it is locked with a strong password.
Firefox Browser vulnerable to Man-in-the-Middle Attack
A critical vulnerability resides in the fully-patched version of the Mozilla’s Firefox browser that could allow well-resourced attackers to launch man-in-the-middle (MITM) impersonation attacks and also affects the Tor anonymity network.
The Tor Project patched the issue in the browser’s HTTPS certificate pinning system on Friday with the release of its Tor Browser version 6.0.5, while
Lenovo Tells Users to Uninstall Vulnerable Updater
An advisory from PC maker Lenovo recommends that users uninstall Lenovo Accelerator Application, which includes components rife with security vulnerabilities.
Badlock Vulnerability Falls Flat Against Its Hype
The much anticipated Badlock vulnerability wasn’t in the SMB protocol after all, but in SAM and LSAD and exposed Windows machines to privilege escalation.
How Certificate Transparency Monitoring Tool Helped Facebook Early Detect Duplicate SSL Certs
Earlier this year, Facebook came across a bunch of duplicate SSL certificates for some of its own domains and revoked them immediately with the help of its own Certificate Transparency Monitoring Tool service.
Digital certificates are the backbone of our secure Internet, which protects sensitive information and communication, as well as authenticate systems and Internet users.
The