• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   MITM

Extended Validation Certificates: Warning Against MITM Attacks

  • Posted on:February 25, 2015 at 9:09 pm
  • Posted in:Bad Sites, Vulnerabilities
  • Author:
    Chris Bailey (General Manager, Trend Micro SSL)
0

The recent Superfish incident has raised more concerns that SSL/TLS connections of users can be intercepted, inspected, and re-encrypted using a private root certificate installed on the user system. In effect, this is a man-in-the-middle (MITM) attack carried out within the user’s own system. We believe that site owners adopting extended validation (EV) certificates would help…

Read More
Tags: MITMSSLsuperfish

POODLE Vulnerability Puts Online Transactions At Risk

  • Posted on:October 15, 2014 at 11:58 am
  • Posted in:Exploits, Vulnerabilities
  • Author:
    Ziv Chang (Director, Cyber Safety Solution)
3

Earlier today, Google researchers Bodo Möller, Thai Duong, and Krzysztof Kotowicz released a paper discussing a serious bug in SSL 3.0 that allows attackers to conduct man-in-the-middle attacks and decrypt the traffic between Web servers and end users. For example, if you’re shopping online with your credit card, you may think that your information is secure…

Read More
Tags: man in the middleMITMPOODLESSLSSL 3.0TLS

Security Advisory: Patch Systems with the Latest Security Updates from OpenSSL

  • Posted on:June 6, 2014 at 9:38 am
  • Posted in:Vulnerabilities
  • Author:
    Bernadette Irinco (Technical Communications)
0

OpenSSL has recently released six security updates addressing vulnerabilities found in OpenSSL. As of this writing, there is no reported exploit leveraging these vulnerabilities in the wild. The security patches cover the following vulnerabilities: SSL/TLS MITM vulnerability (CVE-2014-0224) DTLS recursion flaw (CVE-2014-0221) DTLS invalid fragment vulnerability (CVE-2014-0195) SSL_MODE_RELEASE_BUFFERS NULL pointer dereference (CVE-2014-0198) SSL_MODE_RELEASE_BUFFERS session injection…

Read More
Tags: CVE-2010-5298CVE-2014-0195CVE-2014-0198CVE-2014-0221CVE-2014-0224CVE-2014-3466CVE-2014-3470denial-of-service attackDoS attackDTLSman-in-the-middle attackMITMOpenSSLsecurity advisorySSL/TLSTrend Micro Deep Securityvulnerability

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.