Jones Harbour of the U.S. Federal Trade Commission complained the online vendors who claim to respect privacy launch products where the guiding privacy policy is
Leviathan Security Group has developed generic attack code using the Authentication Gap bug, but launching an attack is very difficult and first requires a man-in-the-middle attackrn
There is a serious weakness in SSL and we need to be careful when selecting a security protocol. But we have seen no actual man in the middle attacks and researchers are working on the problem right now
At the Black Hat conference, researchers plan to demonstrate a weakness in domain validation using secure sockets layer Web sessions, allowing hackers to get passwords. This is especially true in open Wi-Fi networks