Some researchers have revealed that messaging applications
are not as secure as they tell us, ya que han descubierto que tras ejecutar “ataques de canal lateral de secuestro de sesión”, these messaging applications
expose all the user's messages in the application.

The vast majority of messaging applications store this information in encrypted form, but when replicating the
sessions, this encryption is worthless.

Nevertheless, These types of attacks are not easy to carry out. A researcher from the company SecureData Labs comments that this type of side-channel attacks are costly and complex, therefore
attackers usually choose to carry out other simpler types of attacks to get information from users.

Nevertheless, despite the difficulty and cost involved in carrying out this type of attack, they are also the most ignored by security systems, which makes them attacks with
higher success rate.


Leave a Reply

Your email address will not be published. Required fields are marked *

More news
Vimeo sufre una brecha de datos
Read more »
Booking.com suffers a data exfiltration of bookings
Read more »
La franquicia de gimnasios Basic-Fit sufre una exfiltración de datos
Read more »
New wave of scams using AI-cloned voices
Read more »
Una brecha en la Comisión Europea salpica unas treinta instituciones
Read more »