September 17, 2009 | Published by | SearchSecurity.com | |||
Threat Monitor |
| ||
How SSL-encrypted Web connections are intercepted | ||
Sherri Davidoff, Contributor Encrypted Web connections are routinely intercepted by enterprises for legitimate reasons. Unfortunately, attackers can use the same methods for tapping into "secure" connections, most often because of endpoint weaknesses. In this tip, we'll examine how enterprises and attackers intercept Web connections that are encrypted using the Transport Layer Security (TLS) protocol or its predecessor, the Secure Sockets Layer (SSL) protocol. Read more |