Is Iran trying to steal your passwords and mail service of its citizens? Hacking one's secure network systems imply for
Is Iran was behind the hacking into one of the most sensitive systems of the Internet? If you believe a number of security experts - yes, and sophistication of the break suggests that this is a government or military body. Stated already, the damage of the break repaired within a few days, and target audience was supposed to get hurt from it is the Iranian people itself. In dry, what happened was an expenditure of SSL certificates fraudulently, while hacking the site of one of providers certificates. Nine papers were servers of Gmail, Hotmail, Yahoo, Skype and Firefox, as well as one general certificate. Breakthrough was detected within hours and papers have been blocked by the manufacturers of all browsers within days. Currently, updated versions of Firefox, IE and chrome did not confirm the documents. To better understand what happened, should know that the Internet is based on virtual handshakes. When you go to a secure connection, to prevent phishing, the browser that you use checks the certificate hanging on the virtual wall of this site. The goal is to understand who really is a site which wanted to enter, no one was routed to its own media server and impersonation, to steal your information. Browsers have a list of these producers rely on them cards, and one of these manufacturers now managed to break. Iran, apparently. Must note - very few chances of breakthrough is the work of an individual. This is a simple Web user can do nothing with fake IDs. To take advantage of them, need access to the Internet infrastructure in order to route the fake server users. This is not the first time a state tries to break into the Internet accounts of its citizens. China executes more visible and less follow-up after its Internet users, Achsababer is already accused of trying to break through to Gmail and other services, while government in Tunisia tried to steal passwords citizens Gmail, Yahoo and Facebook.
0 comments:
Post a Comment