It is quite difficult to overcome sniffer attacks. However, the following steps can be taken as countermeasures against such attacks:

* Use encrypted protocols for all communication.
* Segment the network to limit the spread of information.
* Use switches instead of hubs since they switch communications, which means that information is delivered only to the predefined host.
* Use a sniffer detector that checks whether an NIC is in promiscuous mode or not.
* For wireless networks, reduce the range of the network so that it can cover only the necessary surface area.

Explore More

What are the security holes in the Basic Authentication scheme?

The Basic Authentication scheme uses the username and password and encrypts the password using base64 encoding. In spite of this, there are still many security holes in the Basic Authentication

Critical SQL Injection in Red Link

PlanetCreator has reported another critical SQL Injection (vulnerability) on Red Link http://www.redlink.net.mm/ SQL injection is a code injection technique that exploits a security vulnerability occurring in the database layer of

More Trojan horse for Apple Mac! Is Mac more insecure than windows?

One more malware have been spotted for the Apple Mac machine. This time Trojan.iServices.B which gets into the system, open the backdoor in Mac machines and connect them to a