/
Navigation
C
Chronicles
Browse all articles
C
E
Explore
Semantic exploration
E
R
Research
Entity momentum
R
N
Nexus
Correlations & relationships
N
~
Story Arc
Topic evolution
S
Drift Map
Semantic trajectory animation
D
P
Posts
Analysis & commentary
P
Browse
@
Entities
Companies, people, products, technologies
Domains
Browse by publication source
Handles
Browse by social media handle
Detection
?
Concept Search
Semantic similarity search
!
High Impact Stories
Top coverage by position
+
Sentiment Analysis
Positive/negative coverage
*
Anomaly Detection
Unusual coverage patterns
Analysis
vs
Rivalry Report
Compare two entities head-to-head
/\
Semantic Pivots
Narrative discontinuities
!!
Crisis Response
Event recovery patterns
Connected
Nav: C E R N
Search: /
Command: ⌘K
Embeddings: large
Company

MITM

13 articles accelerating
Articles
13
mentions
Velocity
+100.0%
growth rate
Acceleration
+1.000
velocity change
Sources
7
publications

Coverage Timeline

2024-08-16
Washington Post 33 related

Google says it will remove Showcase.apk from Pixel devices “out of an abundance of precaution”, after iVerify said hackers could use the dormant app to spy

'Dangerous' New Spyware Warning Issued Vinayak Guha / Android Authority : Flaw in Verizon Pixel's firmware poses serious security threat (Update: Google statement) Threads: Lauren Goode / @laurengoode...

2024-07-11
Ars Technica 26 related

Researchers detail the Blast-RADIUS MD5-based vulnerability affecting RADIUS, a widely used network access authentication protocol first developed in 1991

AWAITING ANALYSIS  —  This vulnerability is currently awaiting analysis. Microsoft Support : KB5040268: How to manage the Access-Request packets attack vulnerability associated with CVE-2024-3596 Conn...

2023-12-20
Ars Technica 15 related

Researchers detail a MITM attack on SSH that can break the integrity of the protocol, the first “practical attack of its kind”; fixes face compatibility issues

SSH is an internet standard that provides secure access to network services … Connor Jones / The Register : SSH shaken, not stirred by Terrapin vulnerability Terrapin Attack : Terrapin Attack: Breakin...

2023-05-12
Engadget 32 related

Twitter rolls out encrypted DMs, but both sender and recipient must be Blue subscribers, group messages are not supported, and message metadata is not encrypted

Starting with Verified Users Jay Peters / The Verge : Twitter launches encrypted DMs behind a paywall Geoff Desreumaux / WeRSM : Twitter Launches Encrypted DMs, But Only For Paid Subscribers Tweets: E...

2020-02-01
ZDNet 20 related

Microsoft launches Xbox bug bounty program, will pay rewards up to $20K for vulnerabilities found in the Xbox Live network and services

The Xbox Bounty Program invites gamers … Ethan Gach / Kotaku : Microsoft's Bug Bounty Program Will Pay Players To Find Security Flaws In Xbox Live Anthony Spadafora / TechRadar.com : Microsoft to pay ...

2020-01-15
Krebs on Security 28 related

Microsoft pushes a fix for a critical flaw in a cryptographic component present in all versions of Windows; NSA says it alerted Microsoft to the bug

rather than weaponizing it Robert Hackett / Fortune : The NSA patches up its reputation with a gift to Microsoft Mark Wyciślik-Wilson / BetaNews : Microsoft turns the screws on Windows 7 users with fu...

2018-11-29
Ars Technica 13 related

Sennheiser's HeadSetup software makes PCs and Macs vulnerable to MITM attacks due to flawed self-signed TLS certificate, which users should now manually remove

Poorly secured certificate lets hackers impersonate any website on the Internet.  —  Audio device maker Sennheiser has issued …

2016-12-03
Ars Technica 18 related

AirDroid, a remote management app with 10M+ Play Store downloads, uses a static and easily detectable encryption key leaving users vulnerable to MITM attacks

Dan Goodin / Ars Technica :

2016-12-02
Ars Technica 9 related

AirDroid, a remote management app with 10M+ Play Store downloads, uses a static and easily detectable encryption key leaving users vulnerable to MITM attacks

For six months, the remote management app has opened users to code-execution attacks.  —  For at least the past six months …

2016-08-04
Ars Technica 1 related

Researchers demo new attack technique, HEIST, that lets hackers steal sensitive data like SSNs and e-mail addresses from HTTPS pages without a MITM position

Approach exploits how HTTPS responses are delivered over transmission control protocol.  —  The HTTPS cryptographic scheme protecting millions …

Loading articles...

Quarterly Coverage

Top Sources

Narrative

Loading narrative...

Relationships

Loading graph...