Beware Proxy Attacks

by [Published on 29 July 2016 / Last Updated on 1 Aug. 2016]

Hackers can intercept HTTPS URLs

Researchers have demonstrated how a design flaw affecting most operating systems and web browsers can be exploited to exfiltrate HTTPS URLs and conduct various types of malicious activities. The attack relies on proxy auto-config (PAC) files, which specify how web browsers and other user agents handle HTTP, HTTPS and FTP traffic."

Read more here:

See Also

Review and Comments

The Author — Debra Shinder

Debra Shinder avatar

DEBRA LITTLEJOHN SHINDER, MCSE, MVP (Security) is a technology consultant, trainer and writer who has authored a number of books on computer operating systems, networking, and security.