Secure Sockets Layer (SSL): How It Works What Happens When a Browser Encounters SSL A browser attempts to connect to a website secured with SSL. The browser requests that the web server identify itself. The server sends the browser a copy of its SSL Certificate. The browser checks whether it trusts the SSL Certificate. If so, it sends a message to the server. The server sends back a digitally signed acknowledgement to start an SSL encrypted session. Encrypted data is shared between the browser and the server . Encryption Protects Data During Transmission Web servers and web browsers rely on the Secure Sockets Layer (SSL) protocol to help users protect their data during transfer by create a uniquely encrypted channel for private communications over the public Internet. Each SSL Certificate consists of a key pair as well as verified identification information . When a web browser (or client) points to a secured website, the server shares the public key with
Posts
Advice from a Victim of Identity Theft: Tips for Limiting the Damage (Part 2 of 2)
- Get link
- X
- Other Apps
Working in Internet security, I try to embrace the best practices that would prevent identity theft ( see my previous blog post: Advice from a Victim of Identity Theft: Preventative Measures ), but sometimes that’s not enough. Criminals managed to get my name, address, birth date, driver’s license number, bank account number, and social security number. My guess is that a company I do business with got hacked—and they probably don’t even know it. What did the criminals do with my personal information? They made a fake driver’s license and entered branches of my bank in India and withdrew money, emptying my bank account. Then they made fake checks and managed to cash them, overdrawing my account. They also made a second driver’s license and had someone in india open multiple new retail accounts in my name. How did I find out? I logged on to do some online banking and found my checking account drained. Later, I received a call from Target asking if I had opened a Target accoun
Advice from a Victim of Identity Theft: Preventative Measures (Part 1 of 2)
- Get link
- X
- Other Apps
Recently, I was a victim of identity theft. I’ve been marketing Internet security solutions for 10 years, but now I know firsthand what it feels like to have your identity stolen. I’ve learned some new ways to protect myself that I’d like to share. Identity theft can be split into two categories. The first is when an existing account is accessed by an unauthorized user and the other is when new accounts are opened using stolen personal information. Here are some of the leading methods criminals use to steal this information and some tips on how to keep safe: Phishing Phishing uses various scams to get you to provide your personal information. Criminals use different ploys such as scare tactics (your account will be closed), free gifts, or pleas from someone needing help. They can appear to come from legitimate businesses or even from people you know. A good spam filter will block most phishing emails and mobile security can block these threats on your mobile devices. But
Dealing with fishy Messages
- Get link
- X
- Other Apps
According to the article in Dark Reading, Study: Phishing Messages Elude Filters, Frequently Hit Untrained Users, many people are still being tripped up by phishing emails. The article summarizes the findings of a survey that was conducted at the Black Hat USA security conference held in July 2012. Of the 250 conference attendees that were polled, 69% said that phishing messages get past spam filters and into users’ inboxes on a weekly basis. Over 25% indicated that top executives and other highly privileged employees have been successful targets of phishing attacks. Many phishing messages aren’t difficult to spot, but if you don’t know what you are looking for you can easily get hooked. Filtering Software Can Help, But… Stated simply phishing messages are fraudulent attempts to obtain your personal information through email or social media messaging. Armed with your credit card numbers, bank account data or social media account information, the bad guys can steal m
83 Million Facebook Accounts Are Fake
- Get link
- X
- Other Apps
The number of fake accounts on Facebook is roughly the size of Egypt’s population and larger than most of the world’s countries, the company disclosed this week. In a 10-Q filing, Facebook acknowledged that a total of 8.7% — or 83 million — accounts on the network are bogus. Of that 8.7%, 4.8% are duplicate accounts, 2.4% are user-misclassified accounts and 1.5% are “undesirable” accounts, a.k.a. spam. The figure is a bit higher than the company’s previous estimates. In a March filing, Facebook claimed about 5% to 6% of its accounts — or 40.3 million to 50.7 million — were fake. The company also says it bans at least 20,000 accounts daily and estimates about 600,000 accounts per day are compromised. Taking the latest figures into account, Facebook’s latest claim of 955 million active users would be downgraded to 872 million report by:- mashable for more info visi:- RED ZONE DIGITAL SECURITIES
DDoS (Distributed Denial of Service) Attack
- Get link
- X
- Other Apps
Your army against their army You don’t need to have enemies to fall vulnerable to Distributed Denial of service (DDoS) attacks. A recent survey from McAfee states that 80% of respondents, who represented different organizations across the world, said that they have faced a DDoS attack. What is DDoS? Distributed Denial of Services: Goal: make a service unusable How: overload a server, router, network link Focus: bandwidth attacks Increased Frequency: 35% of responded see 10 or more DDoS attack per month compared to 18% in 2009 Here’s a snapshot of that survey: Distributed Denial of Service attacks cost an average enterprise $6.3M for a 24-hour outage Reality check Are your systems protected against? Unavailability of network / applications Business loss Brand impact if network/application is customer facing Bandwidth usage shoots up Hardware failures (servers, routers, firewalls, etc.) MDDoS in Action MDDoS coverage and benefits include Compre
Pirate Bay Plans to Circumvent Blocking
- Get link
- X
- Other Apps
As more and more governments block access to Pirate Bay, the website intends to educate users on ways to bypass censorship. The Court of The Hague has ordered seven ISPs to block access to Pirate Bay. The ISPs must comply or face fines of 10,000 euros per day. In the United Kingdom, the High Court ordered that several ISPs, including TalkTalk, Virgin Media, Sky, Everything Everywhere and 02, must prevent their users from accessing the Pirate Bay website. The ruling came after nine music labels, including EMI, Sony and Warner, filed a lawsuit asking for a blockade based on Section 97A of the Copyright, Designs and Patents Act. A Pirate Bay spokesman said “This will just give us more traffic, as always. Thanks for the free advertising.” One week after the British ruling, Pirate Bay enjoyed an increase in traffic by 12 million visitors, proving that the publicity surrounding the verdict benefited the torrent site. Pirate Bay insiders see it as an opportunity to educate more people