Information Leakage

Contents 1)     Introduction. 2 2)     Information Leakage. 2 3)     Types of Information Leakage. 4 a) Intentional Leaks. 4 i) Internal Agents. 5 ii) External Agents. 6 b) Accidental Leaks. 6 4)     Exploitation Channels. 8 a) Electronic Mail 8 b) Hard Copy. 9 c) Improper Configuration of Security Systems. 9 i)…

Nokia Performing Man-in-the-Middle Attacks

From Bruce Schneier’s Cryptogram: Man-in-the-Middle Attacks Against Browser Encryption Last week, a story broke about how Nokia mounts man-in-the-middle attacks against secure browser sessions. “The Finnish phone giant has since admitted that it decryption secure data that passes through HTTPS connections — including social networking accounts, online banking, email and…