Cookies help us display personalized product recommendations and ensure you have great shopping experience.

By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
SmartData CollectiveSmartData Collective
  • Analytics
    AnalyticsShow More
    media monitoring
    Signals In The Noise: Using Media Monitoring To Manage Negative Publicity
    5 Min Read
    data analytics
    How Data Analytics Can Help You Construct A Financial Weather Map
    4 Min Read
    financial analytics
    Financial Analytics Shows The Hidden Cost Of Not Switching Systems
    4 Min Read
    warehouse accidents
    Data Analytics and the Future of Warehouse Safety
    10 Min Read
    stock investing and data analytics
    How Data Analytics Supports Smarter Stock Trading Strategies
    4 Min Read
  • Big Data
  • BI
  • Exclusive
  • IT
  • Marketing
  • Software
Search
© 2008-25 SmartData Collective. All Rights Reserved.
Reading: Firesheep and social network security: What you need to know
Share
Notification
Font ResizerAa
SmartData CollectiveSmartData Collective
Font ResizerAa
Search
  • About
  • Help
  • Privacy
Follow US
© 2008-23 SmartData Collective. All Rights Reserved.
SmartData Collective > IT > Security > Firesheep and social network security: What you need to know
Security

Firesheep and social network security: What you need to know

Editor SDC
Editor SDC
2 Min Read
SHARE

Social network security is all the talk this month, as Firefox recently launched it’s Firesheep plugin.  In a nutshell, the new plugin makes it possible for users to hijack other people’s social network connections if they are using a public Wifi connection. 

Social network security is all the talk this month, as Firefox recently launched it’s Firesheep plugin.  In a nutshell, the new plugin makes it possible for users to hijack other people’s social network connections if they are using a public Wifi connection. 

How does it work?  Most social networks, including Facebook,  authenticate clients with cookies. If someone is using a public WiFi connection, the cookies are sniffable. Firesheep uses wincap to capture and display the authentication information for accounts it sees, allowing the user to hijack a connection.

More Read

vpn benefits of streaming in the world of big data
Importance of VPNs For Streamers in a Data-Centric World
Tag, Anyone?
Big Data Leads to Better Virtual Private Servers for Small Businesses
Private Cloud Computing: How It Changes Disaster Recovery
Geospatial TTPs Contribute To Cyber Security

Sounds like a potential problem for social network users in airports, hotels and the other 1,000,000,000 places that offer public Wifi.  And how about businesses that employ remote agencies, consultants or employees to manage their social networks? 

Fortunately, there are a few ways to protect yourself or your business from social network hijackers.  The most basic include:

1) Only visiting sites using HTTP Secure (beginning with https://), which make user cookies invisible to Firesheep.

2) Downloading the Firefox extension Force-TLS,  where you can assign and force which sites you want to use the HTTPS protocol. 

3) Trying a program like HTTPS Everywhere, which forces every website you visit to use HTTPS protocol.  

What about those who own or manage social network or other hijackable websites?  In order to protect your users and keep your website secure, try adding a SSL certificate to your website.  A Secure Link SSL certificate  shows visitors that your web site is safe for them to submit their personal data and gives users peace of mind when navigating the social web. 

Read more at No-IP Blog.

Share This Article
Facebook Pinterest LinkedIn
Share

Follow us on Facebook

Latest News

cloud dataops for metering
Taming the IoT Firehose: How Utilities Are Scaling Cloud DataOps for Smart Metering
Cloud Computing Exclusive Internet of Things IT
ai in video game development
Machine Learning Is Changing iGaming Software Development
Exclusive Machine Learning News
media monitoring
Signals In The Noise: Using Media Monitoring To Manage Negative Publicity
Analytics Exclusive Infographic
data=driven approach
Turning Dead Zones Into Data-Driven Opportunities In Retail Spaces
Big Data Exclusive Infographic

Stay Connected

1.2KFollowersLike
33.7KFollowersFollow
222FollowersPin

You Might also Like

Dronegate: The First Casualty is Our Cybersecurity Paradigm

6 Min Read

The Complex Process of Keeping Access Governance Software Simple

6 Min Read

Update on the 6 March 2012 Government Big Data Forum

4 Min Read
separation of duties for data security
Security

5 Reasons SoD Protocols Are Vital to Modern Data Security

7 Min Read

SmartData Collective is one of the largest & trusted community covering technical content about Big Data, BI, Cloud, Analytics, Artificial Intelligence, IoT & more.

ai chatbot
The Art of Conversation: Enhancing Chatbots with Advanced AI Prompts
Chatbots
AI and chatbots
Chatbots and SEO: How Can Chatbots Improve Your SEO Ranking?
Artificial Intelligence Chatbots Exclusive

Quick Link

  • About
  • Contact
  • Privacy
Follow US
© 2008-25 SmartData Collective. All Rights Reserved.
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?