11 April 2014- SecBrief
Why Every Website Should Use Always On SSL (AOSSL)
Cloud
NSA Said to Exploit Heartbleed Bug for Intelligence for Years- 11 April 2014
11 April 2014- Bloomberg
NSA Said to Exploit Heartbleed Bug for Intelligence for Years
Heartbleed Bug hits at heart of many Cisco, Juniper products- 10 April 2014
10 April 2014- NetworkWorld
Heartbleed Bug hits at heart of many Cisco, Juniper products
How Heartbleed Works: The Code Behind the Internet’s Security Nightmare- 10 April 2014
10 April 2014- Gizmodo
How Heartbleed Works: The Code Behind the Internet’s Security Nightmare
Hackers Lurking in Vents and Soda Machines- 7 April 2014
7 April 2014- NY Times
Hackers Lurking in Vents and Soda Machines
Big data: are we making a big mistake?- 28 March 2014
28 March 2014- FT.com
Big data: are we making a big mistake?
How data are HACKED and how you can keep yours SAFE, in one chart-10 January 2014
Navy, Marines to Analyze Pentagon’s Cloud Email System – November 12, 2013
11/12/2013 – Defense One
Navy, Marines to Analyze Pentagon’s Cloud Email System
How the Bible and YouTube are fueling the next frontier of password cracking – October 8, 2013
10/8/2013 – Arstechnica
How the Bible and YouTube are fueling the next frontier of password cracking
ssndb.ms Plot Thickens
Brian Krebs’ investigation into the botnet which was being employed to steal background check data (see previous summary) has taken a darker turn as of late. Apparently, he has found the source code for a number of Adobe products on the hacker’s servers, leading to the conclusion that Adobe’s source code repository, and their records of (avowedly encrypted) customer credit cards has been accessed by the hacking crew.
Access to the source code could help the hackers in developing vulnerabilities for use against acrobat and photoshop users, among other program families. The credit card data breach is also of severe concern. The data may be encrypted, however, the first two quartets of a credit card number are vendor specific and limited to a small set, possibly enabling a known plaintext attack. This of course assumes that the hacker’s penetration did not extend to the encryption keys used by Adobe. However, given that the attackers were able to bypass Adobe’s two-factor access control to acquire their source code, I would say that we should not rule out anything as impossible just yet.
Dan Gifford – MCySec Media Manager