From Sophos Naked Security:
Anatomy of a LOGJAM - another TLS vulnerability, and what to do about it
Transaction security on the internet is where you can find the funkiest vulnerability names.
They include BEAST, Lucky Thirteen, BREACH, POODLE and Heartbleed.
And, of course, FREAK.
FREAK is where you sit yourself on the network between a client and a server, acting as what's called a Man-in-The-Middle (MiTM).
The purpose of this blog is to help small-medium businesses (SMB's) deal effectively with their unique cyber security needs. With over 15 years experience in IT and cyber security I will show SMB's how they can leverage their limited resources to develop effective cyber defenses to the most common threats using information security best practices and no/low cost tools.
LinkedIn: http://www.linkedin.com/in/ecissorsky/
Twitter: @ecissorsky
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment