Home
 > Research and Reports > White Papers > Protecting Users from Firesheep and Other Sidejacking...

Protecting Users from Firesheep and Other Sidejacking Attacks with SSL

Source: Symantec
The recent release of the Firesheep Wi-Fi attack tool has increased awareness among both users and attackers of the inherent insecurity of unprotected HTTP connections. Firesheep allows an attacker connected to the local network to monitor the Web sessions of other users on that network. According to experts, the best solution is to use TLS/SSL for all connections to Web sites. Download this white paper to learn how to avoid these attacks.


Featured publications:

DRINK-IT
Source: The NORRIQ Group Drink-IT® is an advanced and modular software suite that is intended mainly for producers and distribution centers in the beverage industry, such as breweries, specialized beverage wholesalers, and beverage producers. Companies can order specific modules in accordance with their needs and requirements. Drink-IT enables them to cover all enterprise resource planning (ERP) and customer relationship management (CRM) processes in one integrated solution. Drink-IT provides the insight necessary to make informed decisions in production and quality management, logistics, sales, and promotions, and helps companies manage the many legislative aspects of this industry, from lot traceability to taxes, no matter what country they operate in. Drink-IT is globally available and already implemented in more than 80 beverage companies in 30 countries. Drink-IT has more than 3,000 users worldwide. Drink-IT is built on the platform of Microsoft Dynamics NAV2013 R2. This means that the solution is perfectly compatible with all other Microsoft applications and can therefore be integrated seamlessly into almost any existing business environment. Drink-IT has received the status of “Certified for Microsoft Dynamics NAV.” This signifies that Drink-IT has met Microsoft’s highest standard for partner-developed software. The certification is based on independent software tests as well as the Dynamics partner demonstrating a clear focus and strategy. Read More...
Evaluating The Cost Of A DDoS Attack
Source: Dynamic Network Services DDoS (distributed denial-of-service) attacks, attempts to make a network resource unavailable to its users, are becoming more sophisticated and destructive, and are on the rise. DDoS attacks don’t just cost your company the annoyance of downtime, but brand reputation, customer acquisition, and of course, sales are all at risk. Read this white paper to find out how to evaluate the cost of a DDoS attack and decide the level of protection you need for your infrastructure. Read More...
IQMS Continues to Extend EnterpriseIQ ERP Footprint
Written By: Ted Rohm Published On: April 16 2014 IQMS recently announced the release of a number of new large modules and some 550 functional enhancements to its flagship solution EnterpriseIQ. The most recent module added to EnterpriseIQ is the WebDirect B2C portal. The WebDirect B2C storefront lets consumers browse products, make product purchases, and monitor order status and history directly on a manufacturer’s Web site. Read More...


You may also be interested in these related documents:

Protecting Your Network Against the Growing Danger of Web Attacks
Source: Symantec Web-borne malware is now more common than malware entering a company through e-mail. The number of Web sites carrying malware increased by 400 percent in 2008. This can cause serious issues for your business. You need to proactively protect your networks both by instituting acceptable usage policies for employee Web usage and by implementing a solution that can effectively combat these malware intrusions. Find out how. Read More...
Server-gated Cryptography: Providing Better Security for More Users
Source: Thawte Server-gated cryptography (SGC) as part of your secure socket layer (SSL) certificate can protect you from the dangers waiting in cyberspace. But first you should know how SGC-enabled SSL certificates work and why they are different from other certificates. Find out how SGC-enabled SSL can help you assure your customers that you have stronger encryption, greater privacy, and reduced risks of fraud and identity theft. Read More...
Network Data Protection Playbook: Network Security Best Practice for Protecting Your Organization
Source: CipherOptics Malicious hacking and illegal access are just a few of the reasons companies lose precious corporate data every year. As the number of network security breaches increase, companies must find ways to protect data beyond the perimeter of their businesses. But how do they build a data-defensible architecture that will protect data on an ever-evolving network? The answer: by first developing an in-depth defense strategy. Read More...

 
comments powered by Disqus



Recent Searches
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Others

©2014 Technology Evaluation Centers Inc. All rights reserved.