Democratic Underground Latest Greatest Lobby Journals Search Options Help Login
Google

Warning of webmail wi-fi hijack (BBC)

Printer-friendly format Printer-friendly format
Printer-friendly format Email this thread to a friend
Printer-friendly format Bookmark this thread
This topic is archived.
Home » Discuss » Archives » General Discussion (1/22-2007 thru 12/14/2010) Donate to DU
 
eppur_se_muova Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Aug-03-07 11:26 AM
Original message
Warning of webmail wi-fi hijack (BBC)
Using public wi-fi hotspots has got much riskier as security experts unveil tools that nab login data over the air.

Demonstrated at the Black Hat hacker conference in Las Vegas, the tools make it far easier to steal account details, said Robert Graham of Errata Security.

Identifying files called cookies are stolen in the attack which let hackers pose as their victim.

This gives attackers access to mail messages or the page someone maintains on sites such as MySpace or Facebook.

Hacker gathering

Prior to the demonstration, which involved the live hijacking of a Google mail account (GMail), many sites were thought to be safe because they encrypted the data swapped back and forth when people login.
***
more: http://news.bbc.co.uk/2/hi/technology/6929258.stm
Printer Friendly | Permalink |  | Top
L. Coyote Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Aug-03-07 11:35 AM
Response to Original message
1. "PC media players have significant vulnerabilities..."
PC media players have significant vulnerabilities that could be exploited by hi-tech criminals.

The loopholes could be used to attach malicious programs to music or video downloads in order to hijack a PC. ....

===============================

By law, software must have, built in, a means for law enforcement to access computers. How many people have that info?
Printer Friendly | Permalink |  | Top
 
mainegreen Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Aug-03-07 11:49 AM
Response to Original message
2. Lets be perfectly clear: sites designed like this were never thought to be safe.
Merely 'safe enough'.

Many sites drop out of SSL after authentication. This is security suicide. This has always been known.
Trusting that if the cookie is present means you're ok is bad. Known for a while as well.

It should also be noted that 100% safe requires more than SSL, more than mere session verification, more than mere IP verification. If anyone is interested in reading more I suggest you read the OWASP guide to see just how much is involved in making a site secure. It's a lot.

Printer Friendly | Permalink |  | Top
 
DU AdBot (1000+ posts) Click to send private message to this author Click to view 
this author's profile Click to add 
this author to your buddy list Click to add 
this author to your Ignore list Wed May 08th 2024, 02:43 PM
Response to Original message
Advertisements [?]
 Top

Home » Discuss » Archives » General Discussion (1/22-2007 thru 12/14/2010) Donate to DU

Powered by DCForum+ Version 1.1 Copyright 1997-2002 DCScripts.com
Software has been extensively modified by the DU administrators


Important Notices: By participating on this discussion board, visitors agree to abide by the rules outlined on our Rules page. Messages posted on the Democratic Underground Discussion Forums are the opinions of the individuals who post them, and do not necessarily represent the opinions of Democratic Underground, LLC.

Home  |  Discussion Forums  |  Journals |  Store  |  Donate

About DU  |  Contact Us  |  Privacy Policy

Got a message for Democratic Underground? Click here to send us a message.

© 2001 - 2011 Democratic Underground, LLC