Weak-Encryption-POP3S/EN/Consequence

Aus Siwecos
Version vom 26. Oktober 2019, 13:08 Uhr von Siwebot (Diskussion | Beiträge) (Die Seite wurde neu angelegt: „In the worst case, a weak hash algorithm can lead to attackers creating a fake certificate for your servers, impersonating your servers. This means that one se…“)
(Unterschied) ← Nächstältere Version | Aktuelle Version (Unterschied) | Nächstjüngere Version → (Unterschied)
Wechseln zu: Navigation, Suche

In the worst case, a weak hash algorithm can lead to attackers creating a fake certificate for your servers, impersonating your servers. This means that one server can impersonate another server. Criminals may be able to access your customers' personal information such as passwords or credit card information.