Preventing Session Hijacking
This past week a Firefox browser extension called Firesheep has been causing a stir on the web. Firesheep demonstrates how it's possible under certain circumstances to hijack website 'sessions' on another user's computer when you're sharing the same network - like when you're using FreeAgent at your local Starbucks. Since sessions are used to control access to pretty much all web applications - including FreeAgent - the security implications of session hijacking are clear.
We use a secure SSL connection for all requests to the application (like online banks, FreeAgent web addresses start with
https rather than
http), but unfortunately FreeAgent has been susceptible to session hijack attacks at the point at which you were logging in via our website home page or otherwise using a link which had been manually changed to
Of course we've now rectified this so you can be completely sure no-one is listening in, and we've had no reports of anyone being affected. But anyway, you can rest assured that we take this stuff seriously and we're very proactive in responding to such issues as soon as they rear their ugly heads.
- Autumn Budget 2017: business as usual for small businesses
- Customer stories - Village by Village
- Autumn Budget 2017: what you need to know about the second Budget of the year
- Do workers dream of electric bosses? 31% say they would be happy to work for a 'robo-boss'
- Digital detox: the freelancer's guide to switching off