Researchers from Indiana University and Microsoft were able to
infer sensitive data by analyzing the distinct size and other
attributes of each exchange between a user and a website interaction. Using man-in-the-middle attacks, they could glean the
information even when transactions were encrypted using the Secure
Sockets Layer, or SSL, protocol or the WPA, or Wi-fi Protected Access
protocol. Read the full article. [The Register]
MiTM Attacks Can Help Steal Data from SaaS
Author:
Donald Sears
minute read
Share this article:
Researchers from Indiana University and Microsoft were able to
infer sensitive data by analyzing the distinct size and other
attributes of each exchange between a user and a website interaction. Using man-in-the-middle attacks, they could glean the
information even when transactions were encrypted using the Secure
Sockets Layer, or SSL, protocol or the WPA, or Wi-fi Protected Access
protocol. Read the full article. [The Register]