Protecting Users from Firesheep and Other Sidejacking Attacks with SSL

  • Source: Symantec
  • Written By:
  • Published:
  • (Originally Published On:) )
The recent release of the Firesheep Wi-Fi attack tool has increased awareness among both users and attackers of the inherent insecurity of unprotected HTTP connections. Firesheep allows an attacker connected to the local network to monitor the Web sessions of other users on that network. According to experts, the best solution is to use TLS/SSL for all connections to Web sites. Download this white paper to learn how to avoid these attacks.

Featured Software Research:

Growing Google Apps: How to Increase Google Adoption in Your Organization

Change is hard for everyone. But switching from your old system to Google Apps doesn’t have to be difficult, and acceptance of the new Google Apps system within your organization will allow your company to flourish. Supporting everyone on the team through the adoption process is vital to a successful move to Google Apps.

In this white paper, explore core ideas to successfully training on and transitioning to Google Apps, including a slow, steady implementation process that allows the comfort... Read More

The Guide to Google Apps Training: Part Two: How to Secure a Google Apps Domain

You don’t have control over attempted attacks on your domain, but putting the right security systems in place means you can block access to your data and your domain. Google Apps provides users with a wide variety of customizable options to ensure that a domain is secure. Google Apps features stringent user access controls, governing how and when selected users gain access to the domain, and a disaster recovery system in order to retrieve any data compromised due to a security breach.

In... Read More

Defend Your Organization from Cyber-Thieves

Security professionals face the challenge of staying ahead of the rising rate of attacks and the increasing sophistication with which they occur. Organizations must design and adopt more advanced threat protection solutions and strategies that leverage new technologies and approaches to detect and block attacks. With all of the available solutions and approaches from which to choose, how do you know which one will work best for your enterprise?

The SANS Top 20 Critical Security Controls... Read More

You may also be interested in these related documents:

Fraud Alert: Phishing-The Latest Tactics and Potential Business Impact

Phishing continues to grow and effect both consumers and businesses. Read this guide so that you are able to help protect yourself and your customers from these harmful attacks. Read More

Protecting Your Network Against the Growing Danger of Web Attacks

Web-borne malware is now more common than malware entering a company through e-mail. The number of Web sites carrying malware increased by 400 percent in 2008. This can cause serious issues for your business. You need to proactively protect your networks both by instituting acceptable usage policies for employee Web usage and by implementing a solution that can effectively combat these malware intrusions. Find out how. Read More

Server-gated Cryptography: Providing Better Security for More Users

Server-gated cryptography (SGC) as part of your secure socket layer (SSL) certificate can protect you from the dangers waiting in cyberspace. But first you should know how SGC-enabled SSL certificates work and why they are different from other certificates. Find out how SGC-enabled SSL can help you assure your customers that you have stronger encryption, greater privacy, and reduced risks of fraud and identity theft. Read More
 
comments powered by Disqus