How to hack
A menacing hand'€™s shadow on a computer keyboard in front of printed computer data. Dramatic light, high contrast.
Hacker hands
password typist
virtual private network (VPN)
Hacked’s Wiki
Trending Topics
Posts Tagged ‘SSH’
Most Recent
Read More
November 27, 2015

Study: Reused HTTPS Certificates & SSH Keys Put Millions of Devices at Risk

A recent study by an independent security firm analyzing over 4000 embedded devices such as routers, modems, IP cameras, VoIP phones and IPs reveal an industry-wide practice of sharing the same HTTPS server certificates and Secure Shell Host (SSH) keys.

According to a study conducted by researchers at security firm SEC Consult, vast swathes of shared HTTPS certificates and SSH keys could potentially allow malicious attackers to snoop in and listen in to encrypted traffic accessed by millions of devices and its users.

Studying the firmware in over 4000 embedded devices across 70 vendors, the researchers specifically looked into cryptographic keys. These keys include [...]

How to Hack
How Cybercriminals Target Victims: Report Cites Top Information Resources
Knowledge Base
Press Releases
eSentire Partners with Carbon Black to Provide Endpoint Detection Capabilities to the Midmarket
SecurityScorecard Announces Data Science Partnership with Columbia University