Tag Archives: mitm

LogJam, FREAK’s Ugly Cousin

A new encryption attack, called LogJam, has emerged that allows attackers to read and modify the sensitive data passing through encrypted connections, potentially affecting hundreds of thousands of HTTPS-protected sites, mail servers, and other widely used Internet services. A man-in-the-middle … Continue reading

Posted in Security Blog | Tagged , , , , , | Comments Off on LogJam, FREAK’s Ugly Cousin

Single and Vulnerable… By the Millions

Visitors and members of Match.com are vulnerable to plaintext sniffing from a man-in-the-middle attack. Their https, redirects to http then logins are passed in the clear. Completely readable to those on the same network. Read more here.

Posted in Security Blog | Tagged , , , , | Comments Off on Single and Vulnerable… By the Millions

Windows Vulnerable to FREAK

Microsoft confirms that most production versions of Windows are susceptible to the FREAK vulnerability in schannel (secure channel), where an attacker can force a downgrade in the SSL and then perform a man-in-the-middle attack. I last reported that FREAK only … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , , | Comments Off on Windows Vulnerable to FREAK

Factoring attack on RSA-EXPORT Keys (FREAK)

Researchers disclosed a new SSL/TLS vulnerability — the FREAK attack. The vulnerability allows attackers to intercept HTTPS connections between vulnerable clients and servers and force them to use ‘export-grade’ cryptography, which can then be decrypted or altered. The ssl3_get_key_exchange function … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , | Comments Off on Factoring attack on RSA-EXPORT Keys (FREAK)

Lenovo Superfish

Superfish is pre-installed Lenovo adware (thanks Lenovo!), which is meant to place advertisements in your web browser. The problem is that the software also intercepts encrypted traffic, which opens up your computer to man-in-the-middle attacks. Superfish intercepts HTTPS connections. Security … Continue reading

Posted in Security Blog | Tagged , , , , , , , , | Comments Off on Lenovo Superfish

Progressive Insurance’s Snapshot Can be Used to Control Vehicles

2,000,000 vehicles already have the Progressive Snapshot plugged into them via the OnBoardDiagnostic(OBD)-II Port. Digital Bond Labs described at a security conference last week how the Snapshot could be used to hack into some vehicles’ onboard networks. Testing was limited … Continue reading

Posted in Security Blog | Tagged , , , , , , | Comments Off on Progressive Insurance’s Snapshot Can be Used to Control Vehicles

POODLE attack through TLS

POODLE = Padding Oracle On Downgraded Legacy Encryption Once upon a time, in October, I wrote about SSL POODLE, a flaw in how browsers handle encryption; by negotiating down to SSL 3.0, attackers can alter padding data at the end … Continue reading

Posted in Security Blog | Tagged , , , , , , , | Comments Off on POODLE attack through TLS

The Raspberry Pi: Impact on Hacking

So, this video is a little old, but very relevant. Sure the Raspberry Pi has been available for some time now, but has the awareness about them spread out of IT and into the minds of the business leaders? Are … Continue reading

Posted in Security Blog | Tagged , , , , , , , | Comments Off on The Raspberry Pi: Impact on Hacking

Brain-to-Brain Communication Over the Internet

Wow, that’s cool! I would like to coin the phrase “Cybernotic Suggestion” for when brain-to-brain communication over the Internet is subject to a man-in-the-middle attack and the receiving end of the mind comm. gets suggested brain waves.

Posted in Security Blog | Tagged , , , , , , | Comments Off on Brain-to-Brain Communication Over the Internet

SSL 3.0 POODLE

Google security researchers have disclosed a vulnerability in SSL 3.0 that allows attackers to determine the plaintext of secure connections. Attackers can use the flaw to trigger network faults to push browsers back to the 15 year-old platform. POODLE is … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , , | Comments Off on SSL 3.0 POODLE