Browsing articles in "Blog"

What the Heartbleed Bug Is and Why You Need to Change Your Passwords Now

Apr 12, 2014   //   by Crocmaster   //   Web Threats  //  No Comments

The last time we alerted you to a major security breach was when Adobe’s password database was compromised, putting millions of users (especially those with weak and frequently reused passwords) at risk. Today we’re warning you about a much bigger security problem, the Heartbleed Bug, that has potentially compromised a staggering 2/3rds of the secure websites on the internet. You need to change your passwords, and you need to start doing it now.  Read more >>

Critical crypto bug exposes Yahoo Mail, other passwords Russian roulette-style

Apr 9, 2014   //   by Crocmaster   //   Web Threats  //  No Comments

OpenSSL defect still exposing sensitive data even after patch is released.

Lest readers think “catastrophic” is too exaggerated a description for the critical defect affecting an estimated two-thirds of the Internet’s Web servers, consider this: at the moment this article was being prepared, the so-called Heartbleed bug was exposing end-user passwords, the contents of confidential e-mails, and other sensitive data belonging to Yahoo Mail and almost certainly countless other services.  Read more >>

Critical crypto bug in OpenSSL opens two-thirds of the Web to eavesdropping

Apr 9, 2014   //   by Crocmaster   //   Information Security  //  No Comments

Exploits allow attackers to obtain private keys used to decrypt sensitive data.

For a more detailed analysis of this catastrophic bug, see this update, which went live about a few minutes after HackShark published this initial post.

Researchers have discovered an extremely critical defect in the cryptographic software library an estimated two-thirds of Web servers use to identify themselves to end users and prevent the eavesdropping of passwords, banking credentials, and other sensitive data.  Read more >>

How a website flaw turned 22,000 visitors into a botnet of DDoS zombies

Apr 9, 2014   //   by Crocmaster   //   Web Threats  //  No Comments

Everyday browsers are unwittingly conscripted into powerful attack platform.


Researchers have uncovered a recent denial-of-service attack that employed an unusual, if not unprecedented, technique to surreptitiously cause thousands of everyday Internet users to bombard the target with a massive amount of junk traffic.

The attack worked by exploiting a Web application vulnerability on one of the biggest and most popular video sites on the Web, according to a blog post published recently by researchers at security firm Incapsula, which declined to identify the site by name. Malicious JavaScript embedded inside the image icons of accounts created by the attackers caused anyone viewing the users’ posts to run attack code that instructed their browser to send one Web request per second to the DoS victim. In all, the technique caused 22,000 ordinary Web users to unwittingly flood the target with 20 million GET requestsRead more >>

Russia offers to develop supercomputer with India to counter Chinese supremacy

Apr 9, 2014   //   by Crocmaster   //   Latest News  //  No Comments

Russian supercomputing company RSC group and the Russian Academy of Sciences have proposed collaboration with India to set up supercomputing facilities that will rival China’s Tianhe-2, the world’s fastest supercomputer.

“India has many skills for building supercomputers. It is very strong in software,” said Alexey Shmelev, cofounder and chief operations officer of RSC group and delegate to the Russian Academy of Sciences. “I am ready to share technology with India. I guess there would not be many players who are willing to do so.”

In a letter last month, Boris Shabanov of the Russian Academy of Sciences has invited a team from the Indian Institute of Science and the Karnataka government to explore the possibility of a supercomputing centre in Bangalore.   Read more >>



Protected by Copyscape Online Copyright Protection

Latest Visitor Record

DO NOT try to do anything wrong with our website so that we may have to report to the Feds!