<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: New attack steals SSNs, e-mail addresses, and more from HTTPS pages &#124; Ars Technica</title>
	<atom:link href="http://www.epanorama.net/blog/2016/08/03/new-attack-steals-ssns-e-mail-addresses-and-more-from-https-pages-ars-technica/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2016/08/03/new-attack-steals-ssns-e-mail-addresses-and-more-from-https-pages-ars-technica/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Mon, 20 Apr 2026 21:21:29 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2016/08/03/new-attack-steals-ssns-e-mail-addresses-and-more-from-https-pages-ars-technica/comment-page-1/#comment-1503495</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 04 Aug 2016 19:53:08 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=44792#comment-1503495</guid>
		<description><![CDATA[Dan Goodin / Ars Technica:
Researchers demo new exploit, HEIST, executed by Javascript on a visited page, which lets hackers steal sensitive data from HTTPS pages without a MITM position

New attack steals SSNs, e-mail addresses, and more from HTTPS pages
Approach exploits how HTTPS responses are delivered over transmission control protocol.
http://arstechnica.com/security/2016/08/new-attack-steals-ssns-e-mail-addresses-and-more-from-https-pages/

The HTTPS cryptographic scheme protecting millions of websites is vulnerable to a newly revived attack that exposes encrypted e-mail addresses, social security numbers, and other sensitive data even when attackers don&#039;t have the ability to monitor a targeted end user&#039;s Internet connection.

The exploit is notable because it doesn&#039;t require a man-in-the-middle position. Instead, an end user need only encounter an innocuous-looking JavaScript file hidden in an Web advertisement or hosted directly on a webpage. The malicious code can then query a variety of pages protected by the secure sockets layer or transport layer security protocols and measure the precise file sizes of the encrypted data they transmit. As its name suggests, the HEIST technique—short for HTTP Encrypted Information can be Stolen Through TCP-Windows—works by exploiting the way HTTPS responses are delivered over the transmission control protocol, one of the Internet&#039;s most basic building blocks.]]></description>
		<content:encoded><![CDATA[<p>Dan Goodin / Ars Technica:<br />
Researchers demo new exploit, HEIST, executed by Javascript on a visited page, which lets hackers steal sensitive data from HTTPS pages without a MITM position</p>
<p>New attack steals SSNs, e-mail addresses, and more from HTTPS pages<br />
Approach exploits how HTTPS responses are delivered over transmission control protocol.<br />
<a href="http://arstechnica.com/security/2016/08/new-attack-steals-ssns-e-mail-addresses-and-more-from-https-pages/" rel="nofollow">http://arstechnica.com/security/2016/08/new-attack-steals-ssns-e-mail-addresses-and-more-from-https-pages/</a></p>
<p>The HTTPS cryptographic scheme protecting millions of websites is vulnerable to a newly revived attack that exposes encrypted e-mail addresses, social security numbers, and other sensitive data even when attackers don&#8217;t have the ability to monitor a targeted end user&#8217;s Internet connection.</p>
<p>The exploit is notable because it doesn&#8217;t require a man-in-the-middle position. Instead, an end user need only encounter an innocuous-looking JavaScript file hidden in an Web advertisement or hosted directly on a webpage. The malicious code can then query a variety of pages protected by the secure sockets layer or transport layer security protocols and measure the precise file sizes of the encrypted data they transmit. As its name suggests, the HEIST technique—short for HTTP Encrypted Information can be Stolen Through TCP-Windows—works by exploiting the way HTTPS responses are delivered over the transmission control protocol, one of the Internet&#8217;s most basic building blocks.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: haktuts</title>
		<link>https://www.epanorama.net/blog/2016/08/03/new-attack-steals-ssns-e-mail-addresses-and-more-from-https-pages-ars-technica/comment-page-1/#comment-1503314</link>
		<dc:creator><![CDATA[haktuts]]></dc:creator>
		<pubDate>Thu, 04 Aug 2016 05:30:48 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=44792#comment-1503314</guid>
		<description><![CDATA[http://www.haktuts.in/2016/08/new-attack-steals-ssns-e-mail-addresses-from-https-site.html]]></description>
		<content:encoded><![CDATA[<p><a href="http://www.haktuts.in/2016/08/new-attack-steals-ssns-e-mail-addresses-from-https-site.html" rel="nofollow">http://www.haktuts.in/2016/08/new-attack-steals-ssns-e-mail-addresses-from-https-site.html</a></p>
]]></content:encoded>
	</item>
</channel>
</rss>
