I know several users around the office that cache webpages for use offline, but this is apparently a security issue in HTML5 that exposes them to cache poisoning. What details can you provide about this threat? Can you provide any advice on how users can safely cache webpages offline?
Ask the expert
Have questions about enterprise information security threats for expert Nick Lewis? Send them via email today! (All questions are anonymous.)
HTML5 offers users the ability to cache a webpage offline like a traditional full-client application can cache content offline. This scenario could lead to data not being updated as often as desired, or users may assume the data they are using is a legitimate copy of the most recent data from the server.
To defend against cache poisoning, users can rely on a VPN to stop the required man-in-the-middle attack, though relying solely on SSL without a VPN won't protect a user if SSL man-in-the-middle attack tools are used.
There are a couple of things users who want to safely cache Web pages offline should do to secure the cached data. First, they should make sure any sensitive data is properly encrypted because it is stored on the local system. They could also use the private or incognito browsing version where webpages aren't cached, or manually clear all of their Web caches because application caches are managed separately. HTML5 developers could learn from some traditional full-client applications and their use of integrity checks and hashes, both of which can ensure the legitimate version of the cached application is being used.
Dig Deeper on Web browser security
Related Q&A from Nick Lewis
Cloud penetration testing presents new challenges for information security teams. Here's how a playbook from the Cloud Security Alliance can help ... Continue Reading
Island hopping attacks create enterprise risk by threatening their business affiliates. Here's how to create an incident response plan to mitigate ... Continue Reading
Many cloud providers are tight-lipped about internal security control details. Learn how to evaluate cloud security providers with certifications and... Continue Reading