Red alert: HTTPS has been hacked

The site extension we commonly use all the time has been taken by the hands of some very skilled people who just couldn't do anything else. This wasn't impossible of course but the coding and the software necessary in order to implement any command
Bookmark and Share
candan, Canada (prHWY.com) July 16, 2012 - The site extension we commonly use all the time has been taken by the hands of some very skilled people who just couldn't do anything else. This wasn't impossible of course but the coding and the software necessary in order to implement any command was something not short of a genius plan. Sure we appreciate some people who are geniuses but that doesn't give them the right to pry on something, just because of stating that they can. The attack was sudden in the form of a virus itself being called a Beast. What it does and what it did starts from the following; BEAST (Browser Exploit Against SSL/TLS) attack will rank among them because it compromises the SSL and TLS browser connections hundreds of millions of people rely on every day. BEAST cannot break the latest version of TLS -- the current standard based on SSL -- but most browsers and nearly all websites that support secure connections rely on earlier versions of the SSL and TLS protocols, which are vulnerable to BEAST attack. Browser vendors and websites that host secure connections are already scrambling to upgrade to TLS 1.1 or 1.2. How quickly that occurs depends on how many attacks occur in the wild. MitM attacks are fairly easy to do when the attacker and victim are located on the same local network (such as wireless networks, VPNs, or corporate LANs). Some hacking tools, such as Cain & Abel, make MitM attacks and network packet sniffing truly a click of a button. BEAST uses JavaScript running in a victim's Web browser to initiate many different encrypted data blocks, each tim knowing the IV and the plaintext that is being encrypted (in an appropriately designed encryption system, neither of these conditions should be possible as it gives the attacker far too much known information to crib from). This I known as a "block-wise adaptive chosen plaintext attack." This attack was first theorized against SSL/TLS in 200 by Gregory V. Bard. It led to the formation of TLS 1.1 and is implemented in OpenSSL 0.9.6d and later.


Company: Toronto pcs
Phone: 647-693-5036
Email: info@torontopcs.com
Web site http://www.torontopcs.com

###

Tag Words: laptop repairs
Categories: Computers

Press Release Contact
222 Spadina Avenue, Unit # 116 A
Toronto, ON - M5T3B3

Link To This Press Release:

URL HTML Code
Create Press Release
Press Release Options
About This Press Release
If you have any questions about this press release, please contact the listed publisher. Please do not contact prHWY as we cannot help you with your inquiry.