![]() ![]() Basically, you grab any old CA-signed certificate and use it to sign your own falsified certificate. The Basic connstraints exploit takes advantage of the poor logic design of trusted security certificate chains to access the secure network traffic. ![]() Sophos is advising you don’t use these devices for any purpose that requires security. This makes your device perpetually vulnerable to this type of attack. However, if you have an iPod Touch (first or second generation) or an iPhone older than the 3GS, you won’t be able to upgrade to the newest version of iOS with the fix. Apple has addressed this security concern with iOS update 4.3.5. ![]() This hole provides hackers with the ability to view or modify data in transit despite your SSL/TLS secure connection. A well-known security tool – “SSLSNIFF” – has been updated on its ninth anniversary to take advantage of the Basic Constraints security hole in iPhone’s operating systems (versions 3.2 through 4.3.4). ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |