Weak-Encryption/EN/Consequence: Unterschied zwischen den Versionen

Aus Siwecos
Wechseln zu: Navigation, Suche
 
Zeile 1: Zeile 1:
In the worst case, a weak hash algorithm can allow attackers to create a forged [[Certificate|certificate]] for your website and thus to "hack" your website. Criminals could intercept your customers' personal data, such as passwords or credit card information. There is also the risk that criminals may install viruses or trojans on your website. In such a case, you may even be liable for damages suffered by your visitors. Criminals could also create seemingly "legitimate" duplicates of your website. With theses faked "phishing" sites, personal data such as passwords or credit card information can be intercepted while the customer believes that he or she is visiting your company website.
+
In the worst case, a weak hash algorithm can lead to attackers creating a fake [[Certificate|certificate]] for your website and impersonating your website. This means that one server can impersonate another server. Criminals may be able to access your customers' personal information such as passwords or credit card information.

Aktuelle Version vom 11. Juni 2019, 12:28 Uhr

In the worst case, a weak hash algorithm can lead to attackers creating a fake certificate for your website and impersonating your website. This means that one server can impersonate another server. Criminals may be able to access your customers' personal information such as passwords or credit card information.