+1-888-690-2424
  • Internet Explorer Vulnerabilities Provide Fertile Ground For Hackers

    HP claims that there's a simple way for hackers to exploit the sandbox security measures in place within most versions of Internet Explorer. It is reportedly easy for hackers to surreptitiously install malware on end users' computers through the IE browser by utilizing this vulnerability.

        in Authentication
    0
  • Stopping CRIME Attacks

    This article by Dan Goodin appears to cover the most facts about the CRIME attack on SSL/TLS. It answers my first question about what the acronym means; CRIME is short for “Compression Ratio Info-Leak Made Easy.” It also confirms the attack is performed when the communication uses TLS compression. My understanding is that TLS compression is used in SPDY, which

        in Secure Browsing, SSL
    0
  • Don’t fear the BEAST

    A few weeks ago, Juliano Rizzo and Thai Duong published a paper on an SSL attack that they call BEAST, which decrypts parts of an SSL connection. Before I discuss it at length, let me cut to the chase on it. Q: Is this something that you need to worry about? A: No. Here’s a slightly more detailed explanation. The

        in Secure Browsing, SSL
    0