Disabling Encryption to Access Confidential Data

For many years, remote Access Systems, Medical Records Systems, SSL Certificate Generation and many other systems rely email for authentication.This presentation explains how to well known weaknesses in opportunistic email encryption can be used toCompromise accountsHijack computersGenerate fraudulent SSL CertificatesAccess confidential medical/financial records.Intercept, hijack, and modify https sessions.Capture bank credentialsPerform social engineering / fraud

Presented by