Home
 > Research and Reports > White Papers > Protecting Users from Firesheep and Other Sidejacking...

Protecting Users from Firesheep and Other Sidejacking Attacks with SSL

Source: Symantec
The recent release of the Firesheep Wi-Fi attack tool has increased awareness among both users and attackers of the inherent insecurity of unprotected HTTP connections. Firesheep allows an attacker connected to the local network to monitor the Web sessions of other users on that network. According to experts, the best solution is to use TLS/SSL for all connections to Web sites. Download this white paper to learn how to avoid these attacks.


Featured publications:

Go from Analysis to Action on Your Desktop
Source: IBM Business users need a simple but powerful way to navigate through data and find the insights to make timely, critical business decisions. This paper explores how a breakthrough personal analytics tool enables business managers to improve performance within their functional areas. Read More...
Comparing the Total Cost of Ownership of Business Intelligence Solutions
Source: Birst For many companies, traditional business intelligence (BI) software is costly and resource-intensive. So are open source alternatives that require significant configuration and integration. In contrast, software-as-a-service (SaaS) solutions can reduce the cost of a BI deployment by providing automation and pre-integration. Compare total cost of ownership (TCO) for traditional, open source, and SaaS BI solutions. Read More...
11 Criteria for Selecting the Best ERP System Replacement
Source: Epicor An enterprise resource planning (ERP) system is your information backbone, reaching into all areas of your business and value chain. That’s why replacing it can open unlimited business opportunities. The cornerstone of this effort is finding the right partner. And since your long-term business strategy will shape your selection, it’s critical that your ERP provider be part of your vision. Read More...


You may also be interested in these related documents:

Fraud Alert: Phishing-The Latest Tactics and Potential Business Impact
Source: Symantec Phishing continues to grow and effect both consumers and businesses. Read this guide so that you are able to help protect yourself and your customers from these harmful attacks. Read More...
Protecting Your Network Against the Growing Danger of Web Attacks
Source: Osterman Research, Inc. Web-borne malware is now more common than malware entering a company through e-mail. The number of Web sites carrying malware increased by 400 percent in 2008. This can cause serious issues for your business. You need to proactively protect your networks both by instituting acceptable usage policies for employee Web usage and by implementing a solution that can effectively combat these malware intrusions. Find out how. Read More...
Server-gated Cryptography: Providing Better Security for More Users
Source: Thawte Server-gated cryptography (SGC) as part of your secure socket layer (SSL) certificate can protect you from the dangers waiting in cyberspace. But first you should know how SGC-enabled SSL certificates work and why they are different from other certificates. Find out how SGC-enabled SSL can help you assure your customers that you have stronger encryption, greater privacy, and reduced risks of fraud and identity theft. Read More...

 
comments powered by Disqus



Recent Searches
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Others

©2014 Technology Evaluation Centers Inc. All rights reserved.