mitm
When three isn’t a crowd: Man-in-the-Middle (MitM) attacks explained
Jovi Umawing | | catchapp, FYI, https everywhere, Man In The Middle, Man-in-the-browser, man-in-the-cloud-man-in-the-iot, mitm, Phishing, spyeye, Superfish, wi-fi eavesdropping, zeus
Maybe it’s the quirky way some tech writers abbreviate it, or the surreal way it reminded you of that popular Michael Jackson song. Whatever triggers you to remember the term, for most ...
ZipperDown: Remote Code Execution Attack on iOS Apps
Su Mon Kywe | | .zip, Android vulnerability, insecure mobile apps, iOS Vulnerability, mitm, mobile app risk, Mobile Security Insights, mobile threat protection, Mobile Threat Research, Pangu Lab, Remote Code Execution, remote code execution attack, risky mobile apps, unencrypted wifi, unencrypted zip files, vulnearbilities, zip files, ZipperDown
On May 15, 2018, Pangu Lab announced the ZipperDown vulnerability, which allows a remote code execution attack on iOS apps. Although Pangu Lab did not disclose the details of the ZipperDown vulnerability, ...
Mobile security: Enterprise data via mobile is the next frontier for cyber criminals
Domingo Guerra | | app-security, Data Privacy, eavesdropper, enterprise app risks, enterprise mobile security, enterprise mobile threats, Hackers, HospitalGown, Malware, mitm, Mobile Security, Mobile Security Insights, Mobile Security Tips, Ransom, sensitive data, Uber, Vulnerabilities
2018 will be the year cyber criminals focus on enterprise mobile security weak spots, exploiting them to harvest sensitive information. All organizations face new security challenges as their workers increasingly go mobile ...
DSploit
DSploitAfter playing with the applications installed on the Pwn Pad, I found that the most important application (at least for me) was missing from the pre-installed apps. Namely, DSploit. Although DSploit has tons ...