Looking to spend a little bit of that tax return on some sweet online deals? The latest news from Microsoft should make you do a double take before entering your credit card data. There is anew report of a windows live digital certificate risk making the rounds. They are reporting that an unauthorized SSL certificate was issued for “live.fi” that could have been used to leverage man-in-the-middle attacks or even spoof official Microsoft announcements.
Showing posts with label SSL. Show all posts
Showing posts with label SSL. Show all posts
Wednesday, April 1, 2015
Phishing News: Windows Live Digital Certificate Risk
Looking to spend a little bit of that tax return on some sweet online deals? The latest news from Microsoft should make you do a double take before entering your credit card data. There is anew report of a windows live digital certificate risk making the rounds. They are reporting that an unauthorized SSL certificate was issued for “live.fi” that could have been used to leverage man-in-the-middle attacks or even spoof official Microsoft announcements.
Wednesday, March 25, 2015
Defending against the Man in the Middle
I remember as a child trying to eavesdrop on conversations I would hear in school. They usually were centered around who kissed whom or who had a crush on someone. As an adult, like most others, I still listen in on other people’s conversations from time-to-time. Usually this happens when you’re standing in line somewhere, and it is hard to not listen in on the people next to you. After talking with a colleague over the weekend about man-in-the-middle (MITM) attacks, I found some similarities to the more typical activity of eavesdropping on others conversations.
Labels:
anti-virus,
authentication,
certificate based authentication,
cybersecurity,
data,
data protection,
firewall,
hack,
Hacker Attacker,
hacker news,
hacker solutions,
hackers,
ITsecurity,
Man in the middle,
MITM,
SSL
Thursday, March 12, 2015
FREAK and Geeks: Attack and Defense
The Best Offense is a Good Defense
Glass houses are always the worst choice to live in; unless, of
course, you want to share your most private secrets with your neighbors. Most people prefer a house with stronger,
thicker, and less ‘see all’ walls where they can protect themselves and their
personal information. Neighbors can
throw stones all they want, but they’re not going to crack the walls of an
ancient, brick-mortar Victorian.
It’s an issue as old as time: people will always want to protect
their personal data from prying eyes.
Whether that means a thicker flap over the entrance to a straw hut, or a
high-end security system that monitors every entrance and exit to a mansion on
a hill. But as Hollywood has shown us time and again, where there is extra
security, there is usually somebody trying to take what’s hiding inside.
The digital age has only exacerbated this issue for most users and
companies around the world. The stronger
the information security in place, the more vigorous hackers attack in order to
find out what is hiding behind the high stone walls on the top of the
hill. Every so often, these hackers find
a spot where the mortar is weak, and they drill and drill, under cover of
night, until a hole is formed. Then, just out of sight, they sneak in and
quietly make away with everything you value most. So how do you stop somebody coming through
the walls around your data? Find the holes, and seal them back up.
Subscribe to:
Posts (Atom)