I know several users around the office that cache webpages for use offline, but this is apparently a security issue...
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
in HTML5 that exposes them to cache poisoning. What details can you provide about this threat? Can you provide any advice on how users can safely cache webpages offline?
Ask the expert
Have questions about enterprise information security threats for expert Nick Lewis? Send them via email today! (All questions are anonymous.)
HTML5 offers users the ability to cache a webpage offline like a traditional full-client application can cache content offline. This scenario could lead to data not being updated as often as desired, or users may assume the data they are using is a legitimate copy of the most recent data from the server.
To defend against cache poisoning, users can rely on a VPN to stop the required man-in-the-middle attack, though relying solely on SSL without a VPN won't protect a user if SSL man-in-the-middle attack tools are used.
There are a couple of things users who want to safely cache Web pages offline should do to secure the cached data. First, they should make sure any sensitive data is properly encrypted because it is stored on the local system. They could also use the private or incognito browsing version where webpages aren't cached, or manually clear all of their Web caches because application caches are managed separately. HTML5 developers could learn from some traditional full-client applications and their use of integrity checks and hashes, both of which can ensure the legitimate version of the cached application is being used.
Dig Deeper on Web Browser Security
Related Q&A from Nick Lewis
IP devices like multifunction printers and faxes may be an attack vector. Expert Nick Lewis explains the vulnerabilities, and how to secure them ...continue reading
AceDeceiver is a Trojan that can install itself on iOS devices without any certificates. Expert Nick Lewis explains how it works, and how enterprises...continue reading
USB Thief, a new type of stealth malware, leaves no trace on air-gapped targets. Expert Nick Lewis explains how the malware works and how enterprises...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.