Free Republic 2nd Qtr 2024 Fundraising Target: $81,000 Receipts & Pledges to-date: $20,305
25%  
Woo hoo!! And we're now over 25%!! Thank you all very much!! God bless.

Keyword: openssl

Brevity: Headers | « Text »
  • Stop. Put down the cup. Six new bugs found in OpenSSL – including a hole for snoopers

    06/05/2014 11:09:28 AM PDT · by ShadowAce · 6 replies
    The Register ^ | 5 June 2014 | John Leyden
    OpenSSL today pushed out fixes for six security vulnerabilities – including a flaw that enables man-in-the-middle (MITM) eavesdropping on encrypted connections, and another that allows miscreants to drop malware on at-risk systems.A DTLS invalid fragment bug (CVE-2014-0195, affects versions 0.9.8, 1.0.0 and 1.0.1) can be used to inject malicious code into vulnerable software on apps or servers. DTLS is more or less classic TLS encryption over UDP rather than TCP, and is used to secure live streams of video, voice chat and so on.However an SSL/TLS MITM vulnerability (CVE-2014-0224, potentially affects all clients, and servers running 1.0.1 and 1.0.2-beta1) is...
  • Heartbleed: How the Net Bug That Caught Tech Experts by Surprise Affects You

    04/09/2014 3:00:05 PM PDT · by kingattax · 32 replies
    The Blaze ^ | 4-9-14 | Elizabeth Kreft
    This week web experts discovered a huge flaw in the security software used by millions of Web sites — including many banks, email and social media services. Some sites have likened the breach to leaving your front door unlocked, and anyone who knows how to open the door can intrude and expose your confidential information. Unfortunately, the fix isn’t as simple as locking the door from inside your house. The code vulnerability exists within layers of secure Internet server coding. So how does this affect you? * This week web experts discovered a huge flaw in the security software used...
  • ‘Heartbleed’ Bug Exposes Passwords, Web Site Encryption Keys

    04/08/2014 6:13:21 PM PDT · by Drago · 25 replies
    Krebs on Security ^ | 04-08-2014 | Brian Krebs
    Researchers have uncovered an extremely critical vulnerability in recent versions of OpenSSL, a technology that allows millions of Web sites to encrypt communications with visitors. Complicating matters further is the release of a simple exploit that can be used to steal usernames and passwords from vulnerable sites, as well as private keys that sites use to encrypt and decrypt sensitive data.
  • Serious OpenSSL bug renders websites wide open

    04/08/2014 11:13:55 AM PDT · by Utilizer · 30 replies
    itnews au ^ | on Apr 8, 2014 8:07 AM | Juha Saarinen
    A serious vulnerability in the popular OpenSSL cryptographic library has been discovered that allows attackers to steal information unnoticed. Known as the Heartbleed bug, the vulnerability allows anyone on the Internet to read the memory of systems that run vulnerable versions of OpenSSL, revealing the secret authentication and encryption keys to protect the traffic. User names, passwords and the actual content of the communications can also be read. ... OpenSSL recommends that uses immediately upgrade to version 1.0.1g. If that's not possible, users should recompile OpenSSL with the -DOPENSSL_NO_HEARTBEATS flag to remove the the heartbeat handshake. The 1.0.2 version of...