Tag : vulnerability-2

post image

34C3 – Chaos Computer Congress

This year, the Chaos Computer Congress opened his doors in Leipzig.
About 15000 visitors joined the presentation & questions sessions.

All sessions have been recorded and are provided in various formats:
https://media.ccc.de/c/34c3

post image

A Security Vulnerability Datasource

What is CVE?

CVE is a list of information security vulnerabilities and exposures that aims to provide common names for publicly known problems. The goal of CVE is to make it easier to share data across separate vulnerability capabilities (tools, repositories, and services) with this “common enumeration.” Please visit http://cve.mitre.org/about/faqs.html for more information

What is a “Vulnerability?”

An information security “vulnerability” is a mistake in software that can be directly used by a hacker to gain access to a system or network.

What is an “Exposure?”

An information security exposure is a mistake in software that allows access to information or capabilities that can be used by a hacker as a stepping-stone into a system or network.

What is a CVE Identifier?

CVE Identifiers (also called “CVE names,” “CVE numbers,” “CVE-IDs,” and “CVEs”) are unique, common identifiers for publicly known information security vulnerabilities. Each CVE Identifier includes the following:
– CVE identifier number (i.e., “CVE-1999-0067”).
– Indication of “entry” or “candidate” status.
– Brief description of the security vulnerability or exposure.
– Any pertinent references (i.e., vulnerability reports and advisories or OVAL-ID).
– CVE Identifiers are used by information security product/service vendors and researchers as a standard method for identifying vulnerabilities and for cross-linking with other repositories that also use CVE Identifiers.

Who owns CVE?

The MITRE Corporation maintains CVE and this public Web site, manages the compatibility program, and provides impartial technical guidance to the CVE Editorial Board throughout the process to ensure CVE serves the public interest. Please visit cve.mitre.org for more information

Read more:

https://www.cvedetails.com/

post image

Chaos Computer Club

The Chaos Computer Club e. V. (CCC) is Europe’s largest association of hackers. For more than thirty years they are providing information about technical and societal issues, such as surveillance, privacy, freedom of information, hacktivism, data security and many other interesting things around technology and hacking issues. As the most influential hacker collective in Europe they organize campaignsevents, lobbying and publications as well as anonymizing services and communication infrastructure. There are many hackerspaces in and around Germany which belong to or share a common bond to the CCC as stated in their hacker ethics.

Read more:

ccc.de

OpenSSL – Heartbleed Bug

The Heartbleed Bug is a serious vulnerability in the popular OpenSSL cryptographic software library. This weakness allows stealing the information protected, under normal conditions, by the SSL/TLS encryption used to secure the Internet. SSL/TLS provides communication security and privacy over the Internet for applications such as web, email, instant messaging (IM) and some virtual private networks (VPNs).

The Heartbleed bug allows anyone on the Internet to read the memory of the systems protected by the vulnerable versions of the OpenSSL software. This compromises the secret keys used to identify the service providers and to encrypt the traffic, the names and passwords of the users and the actual content. This allows attackers to eavesdrop on communications, steal data directly from the services and users and to impersonate services and users.

Links:

http://heartbleed.com/

http://news.idg.no/cw/art.cfm?id=76F83051-AFDA-B0A2-500DC6997EA04308