#<p><img class="alignleft size-full wp-image-6774" alt="great wall" src="http://channeleye.co.uk/wp-content/uploads/2014/08/great-wall.jpg" width="330" height="330" />Chinese authorities are staging a man-in-the-middle (MITM) attack on Apple’s iCloud after previous attacks on Github, Google, Yahoo and Microsoft.</p>
<p>The man-in-the-middle attack is a form of spying in which the attacker makes independent connections with the victims and relays messages between them, making them believe that they are talking to each other. <a href="http://channeleye.co.uk/great-firewall-of-china-attacks-apple/" class="read_more">more&#187;</a></p><div class="feedflare">
<a href="http://feeds.techeye.net/~ff/techeye?a=QGlY-0Njdp0:2GRfJqeFMQo:yIl2AUoC8zA"><img src="http://feeds.feedburner.com/~ff/techeye?d=yIl2AUoC8zA" border="0"></img></a> <a href="http://feeds.techeye.net/~ff/techeye?a=QGlY-0Njdp0:2GRfJqeFMQo:F7zBnMyn0Lo"><img src="http://feeds.feedburner.com/~ff/techeye?i=QGlY-0Njdp0:2GRfJqeFMQo:F7zBnMyn0Lo" border="0"></img></a> <a href="http://feeds.techeye.net/~ff/techeye?a=QGlY-0Njdp0:2GRfJqeFMQo:V_sGLiPBpWU"><img src="http://feeds.feedburner.com/~ff/techeye?i=QGlY-0Njdp0:2GRfJqeFMQo:V_sGLiPBpWU" border="0"></img></a> <a href="http://feeds.techeye.net/~ff/techeye?a=QGlY-0Njdp0:2GRfJqeFMQo:gIN9vFwOqvQ"><img src="http://feeds.feedburner.com/~ff/techeye?i=QGlY-0Njdp0:2GRfJqeFMQo:gIN9vFwOqvQ" border="0"></img></a> <a href="http://feeds.techeye.net/~ff/techeye?a=QGlY-0Njdp0:2GRfJqeFMQo:TzevzKxY174"><img src="http://feeds.feedburner.com/~ff/techeye?d=TzevzKxY174" border="0"></img></a> <a href="http://feeds.techeye.net/~ff/techeye?a=QGlY-0Njdp0:2GRfJqeFMQo:qj6IDK7rITs"><img src="http://feeds.feedburner.com/~ff/techeye?d=qj6IDK7rITs" border="0"></img></a>
</div><img src="http://feeds.feedburner.com/~r/techeye/~4/QGlY-0Njdp0" height="1" width="1"/>

More...