TITLE

SSL Comes Under Fire

AUTHOR(S)
Sausner, Rebecca
PUB. DATE
September 2009
SOURCE
Bank Technology News;Sep2009, Vol. 22 Issue 9, p14
SOURCE TYPE
Trade Publication
DOC. TYPE
Proceeding
ABSTRACT
Information about the Black Hat 2009 security conference in Las Vegas, Nevada is presented. Chief technical officer (CTO) Jeremiah Grossman and director of solutions architecture, Trey Ford, of WhiteHat Security Inc. discussed some of computer vulnerabilities that the technology company specialized. The paper entitled "Breaking the Security Myths of Extended Validation SSL Certificate," was presented by Alexander Sotirov and Mike Zusman.
ACCESSION #
44210597

 

Related Articles

  • Land of enchantment. Zusman, Mike // Mountain Bike;Jul95, Vol. 11 Issue 7, p20 

    Presents a poem by Mike Zusman about the land of enchantment.

  • New Attach Invisibly Hijacks Web Clicks. FISHER, DENNIS // Information Security;Nov2008, Vol. 11 Issue 9, p13 

    The article announces that attackers use iFrames to hide malicious Web content and force users to click on any button to any website. Jeremiah Grossman and Robert Hansen identified the serious implications of the breach and are now talking with Microsoft and Mozilla for a creation of a fix. The...

  • Being Smart about Cloud Security.  // Technology Review;Nov/Dec2011, Vol. 114 Issue 6, p75 

    An interview with WhiteHat Security founder Jeremiah Grossman is presented. When asked about the advantages associated with the use of cloud computing, he says that a cloud provider helps businesses that are not involved and knowledgeable in information technology (IT) operations manage their...

  • "Hacker Lab" Event Shows How Cybercriminals Attack Small Businesses – and How to Stop Them.  // Insurance Broadcasting;9/11/2014, p1 

    The article offers information on the event "Hacker Lab" presented by HSB, an insurer of data and information risk, on September 9, 2014, which featured presentations that demonstrated how cybercriminals work and offers tips for business enterprises on how to protect themselves. The event...

  • Don't Let Bad Guys Pose as You. Larkin, Erik // PCWorld;Apr2007, Vol. 25 Issue 4, p36 

    The article offers information on the emergence of an online threat that takes advantage of Web site programming flaws to try to access its online accounts. Google recently fixed such a flaw that malefactors could exploit to steal a Gmail user's full contact list. The threat used the...

  • BEWARE OF CLICKJACKERS.  // APC (Bauer Media Group);Jul2009, Vol. 29 Issue 7, p9 

    The article reports that cybersecurity experts are becoming concerned about clickjacking, a technique that allows hackers to display a fake web page and overlay it with a legitimate site in a transparent layer, thereby fooling visitors into taking actions that they didn't intend. Security...

  • Mass SQL Attack. Mimoso, Michael S. // Information Security;Jun2008, Vol. 11 Issue 5, p14 

    The article focuses on a mass-scale SQL injection attacks against Web applications. Computer hackers are using simple search engine queries to compile massive list of ASP and PHP sites as targets. Web application security expert Jeremiah Grossman explained that these attacks have infected...

  • WhiteHat Is Guaranteeing Security. Kerner, Sean Michael // eWeek;9/3/2015, p1 

    The article presents the views of Jeremiah Grossman, founder of WhiteHat Security, related to the security guarantee of the company and focuses on the insufficiency of automated scanning. Topics discussed include views Grossman on Web security; impact of common Web application vulnerabilities...

  • New Browser Flaw Weakens EV SSL Trust.  // Channel Insider;7/21/2009, p1 

    The article reports on the new extended validation SSL (EV SSL) certificates discovered by computer application program developers Mike Zusman and Alex Sotirov. The new EV SSL certificates are designed to combat the trust problems with normal domain validation SSL certificates (DV SSL). Zusman...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics