Blog Posts Tagged with "firesheep"

69dafe8b58066478aea48f3d0f384820

OTA Advocates Always On SSL

March 05, 2012 Added by:Headlines

Online Trust Alliance (OTA) is calling on the security, business and interactive advertising communities to adopt Always On SSL (AOSSL), the approach of using SSL/TLS across your entire website to protect users with persistent security, from arrival to login to logout...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Twitter Offers "Always Use HTTPS" Security Feature

March 17, 2011 Added by:Headlines

The new feature allows users the option to "Always Use HTTPS". Among other security benefits, the HTTPS feature will prevent users from having their login credentials stolen by Firesheep attackers when logging in to their accounts over unencrypted Wi-Fi connections...

Comments  (2)

69dafe8b58066478aea48f3d0f384820

Facebook Offers Firesheep Counter Measure

March 11, 2011 Added by:Headlines

Facebook has finally offered a resolution for a major privacy vulnerability that allows accounts to be hijacked by an application called Firesheep. Firesheep is a FireFox extension that can harvest login credentials when users access their accounts over unencrypted Wi-Fi networks...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Nine Tips for Securing Mobile Devices When Traveling

March 03, 2011 Added by:Headlines

Logan Kugler writes about his experience with being "firesheeped" on a recent trip. Firesheep can harvest login credential on unencrypted Wi-Fi networks. He interviewed several information security experts to compile the following tips on locking down your mobile devices when traveling...

Comments  (0)

76814d6a11ad20c1c48be0e9dce501a7

A Firesheep Overview

January 11, 2011 Added by:Antonio Ierano

What exactly will FireSheep do? FireSheep collects data from cookies. In very simple terms, you can very quickly and easily access the most popular social networking websites using someone else’s credentials – you can basically take over complete access to their account...

Comments  (5)

37d5f81e2277051bc17116221040d51c

Hacking Wireless for Identity Theft

January 02, 2011 Added by:Robert Siciliano

Wireless Internet is available in our homes, offices, cafes, restaurants, parks, hotels, airports, cars, and even airplanes. The mobility factor allows us to work anytime, anywhere, on numerous devices. “Being connected” is at an all-time high. Wireless Internet is amazing. But is it safe?

Comments  (0)

E973b16363b3de77b360563237df7e32

Protecting Against Firesheep with Strict Transport Security

December 27, 2010 Added by:Bozidar Spirovski

Remember, this only protects you against sites that are either already using STS or sites that you have manually added. This really isn't a scalable approach since xyz.com could be vulnerable and you wouldn't know unless you inspected the traffic going back and forth...

Comments  (0)

065b7cfbbb03ac9d18cbf5ed0615b40a

Man in the Middle (MITM) Attacks Explained

December 23, 2010 Added by:Stefan Fouant

MITM attacks come in many forms and essentially allow an attacker to act as a proxy between the victim and any host the victim has established connections with. It is a form of active eavesdropping in which the attacker is controlling the conversation unbeknownst to the victim...

Comments  (0)

065b7cfbbb03ac9d18cbf5ed0615b40a

The Misconceptions of Sidejacking with Firesheep

December 12, 2010 Added by:Stefan Fouant

Recent activity around a new Firefox extension developed by a pair of researchers brings the issue of session hijacking front and center. Firesheep essentially enables an attacker to grab other people's credentials and use them to gain access to various web sites...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

The FireSheep Dilemma - Encrypt Everything?

November 09, 2010 Added by:Rafal Los

If the release of FireSheep has done nothing else - it has certainly demonstrated to people that HTTPS (encryption) is necessary well beyond the login page. Sounds easy enough right? Just "SSL the whole site"? Actually, no. It's not that simple...

Comments  (5)