Category: Network Security

Read about how security administrators protect their networks .

Decrypting HTTPS Traffic

Hypertext Transfer Protocol over SSL (https)  is pretty decent security. This is because https uses the Secure Sockets Layer (SSL) encryption scheme to pass keys between two parties over the Internet. These days, however, most of our Web servers are utilizing Transport Layer Security (TLS 1.2), which is an updated version of SSL 3.0. Therefore, ...

How Does HTTPS Work? The TLS Handshake Explained

http is inherently vulnerable to MitM attacks because client-server communication is transmitted in plaintext over the Internet. This makes http sessions vulnerable to MitM, Session Hijacking, and other dangerous attacks. To remediate this vulnerability, security researchers created https, which stands for Hypertext Transfer Protocol over SSL encryption. Note: Since 2008, we've been using TLS 1.2, ...

Stealing Your Personal Information on a Wireless Hot Spot is Painfully Easy [Demonstration]

Wi-Fi Hot Spots: Just how easy is it for a hacker to steal your personal information over an open Wi-Fi network? The answer is that it's painfully simple. Nowadays, we have https, which uses SSL/TLS encryption to encrypt our traffic between our device and the Web server hosting our favorite Web sites. But, not all ...

All Wi-Fi Networks are Currently Vulnerable to Attack

Security researchers have discovered a new attack that exploits our Wi-Fi networks, both at home and in enterprise environments. Most of our home networks are using one of the IEEE 802.11 wireless network protocols, such as 802.11b, 802.11g, 802.11n, or perhaps, 802.11ac. Our home Wi-Fi networks can likely support several 802.11 protocols; however, it is ...