Cookies help us display personalized product recommendations and ensure you have great shopping experience.

By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
SmartData CollectiveSmartData Collective
  • Analytics
    AnalyticsShow More
    composable analytics
    How Composable Analytics Unlocks Modular Agility for Data Teams
    9 Min Read
    data mining to find the right poly bag makers
    Using Data Analytics to Choose the Best Poly Mailer Bags
    12 Min Read
    data analytics for pharmacy trends
    How Data Analytics Is Tracking Trends in the Pharmacy Industry
    5 Min Read
    car expense data analytics
    Data Analytics for Smarter Vehicle Expense Management
    10 Min Read
    image fx (60)
    Data Analytics Driving the Modern E-commerce Warehouse
    13 Min Read
  • Big Data
  • BI
  • Exclusive
  • IT
  • Marketing
  • Software
Search
© 2008-25 SmartData Collective. All Rights Reserved.
Reading: Firesheep and social network security: What you need to know
Share
Notification
Font ResizerAa
SmartData CollectiveSmartData Collective
Font ResizerAa
Search
  • About
  • Help
  • Privacy
Follow US
© 2008-23 SmartData Collective. All Rights Reserved.
SmartData Collective > IT > Security > Firesheep and social network security: What you need to know
Security

Firesheep and social network security: What you need to know

Editor SDC
Editor SDC
2 Min Read
SHARE

Social network security is all the talk this month, as Firefox recently launched it’s Firesheep plugin.  In a nutshell, the new plugin makes it possible for users to hijack other people’s social network connections if they are using a public Wifi connection. 

Social network security is all the talk this month, as Firefox recently launched it’s Firesheep plugin.  In a nutshell, the new plugin makes it possible for users to hijack other people’s social network connections if they are using a public Wifi connection. 

How does it work?  Most social networks, including Facebook,  authenticate clients with cookies. If someone is using a public WiFi connection, the cookies are sniffable. Firesheep uses wincap to capture and display the authentication information for accounts it sees, allowing the user to hijack a connection.

More Read

big data and AI in medical device cybersecurity
Importance of Data-Driven Cybersecurity for Medical Device Companies
Identity and Privacy: Early Indications, June 2011
Big Data Benefits versus Big Risks [VIDEO]
Big Data Challenges Of Industry 4.0 Worth Considering
Is Shadow IT Still Lurking Inside Your Organization?

Sounds like a potential problem for social network users in airports, hotels and the other 1,000,000,000 places that offer public Wifi.  And how about businesses that employ remote agencies, consultants or employees to manage their social networks? 

Fortunately, there are a few ways to protect yourself or your business from social network hijackers.  The most basic include:

1) Only visiting sites using HTTP Secure (beginning with https://), which make user cookies invisible to Firesheep.

2) Downloading the Firefox extension Force-TLS,  where you can assign and force which sites you want to use the HTTPS protocol. 

3) Trying a program like HTTPS Everywhere, which forces every website you visit to use HTTPS protocol.  

What about those who own or manage social network or other hijackable websites?  In order to protect your users and keep your website secure, try adding a SSL certificate to your website.  A Secure Link SSL certificate  shows visitors that your web site is safe for them to submit their personal data and gives users peace of mind when navigating the social web. 

Read more at No-IP Blog.

Share This Article
Facebook Pinterest LinkedIn
Share

Follow us on Facebook

Latest News

mobile device farm
How Mobile Device Farms Strengthen Big Data Workflows
Big Data Exclusive
composable analytics
How Composable Analytics Unlocks Modular Agility for Data Teams
Analytics Big Data Exclusive
fintech startups
Why Fintech Start-Ups Struggle To Secure The Funding They Need
Infographic News
edge networks in manufacturing
Edge Infrastructure Strategies for Data-Driven Manufacturers
Big Data Exclusive

Stay Connected

1.2kFollowersLike
33.7kFollowersFollow
222FollowersPin

You Might also Like

security audit
ITSecurity

4 Easy Steps How to Conduct IT Security Audit of Your Own Company

17 Min Read
Image
ITSecurity

Report: Social network data theft a leading cybersecurity concern in 2017

2 Min Read

Predictive Policing with Big Data

0 Min Read

CISPA Passes in the House, 3D Modelling of DoD Networks, and More

1 Min Read

SmartData Collective is one of the largest & trusted community covering technical content about Big Data, BI, Cloud, Analytics, Artificial Intelligence, IoT & more.

AI and chatbots
Chatbots and SEO: How Can Chatbots Improve Your SEO Ranking?
Artificial Intelligence Chatbots Exclusive
ai in ecommerce
Artificial Intelligence for eCommerce: A Closer Look
Artificial Intelligence

Quick Link

  • About
  • Contact
  • Privacy
Follow US
© 2008-25 SmartData Collective. All Rights Reserved.
Go to mobile version
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?