FreeBSD Security Advisory – FreeBSD-SA-16:12.openssl

FreeBSD Security Advisory – A cross-protocol attack was discovered that could lead to decryption of TLS sessions by using a server supporting SSLv2 and EXPORT cipher suites as a Bleichenbacher RSA padding oracle. Note that traffic between clients and non-vulnerable servers can be decrypted provided another server supporting SSLv2 and EXPORT ciphers (even with a different protocol such as SMTP, IMAP or POP3) shares the RSA keys of the non-vulnerable server. This vulnerability is known as DROWN. Various other issues were also addressed.

Anti-DDoS Firm Staminus HACKED! Customers Data Leaked

Staminus Communications – a California-based hosting and DDoS (Distributed Denial of Service) protection company – is recovering a massive data breach after hackers broke down into its servers and leaked personal and sensitive details of its customers.

Though the company acknowledged that there was a problem in a message posted to Twitter on Thursday morning, it did not specify a data

FreeBSD Security Advisory – FreeBSD-SA-16:13.bind

FreeBSD Security Advisory – Testing by ISC has uncovered a defect in control channel input handling which can cause named to exit due to an assertion failure in sexpr.c or alist.c when a malformed packet is sent to named’s control channel (the interface which allows named to be controlled using the “rndc” server control utility). An error when parsing signature records for DNAME records having specific properties can lead to named exiting due to an assertion failure in resolver.c or db.c. A remote attacker can deliberately trigger the failed assertion if the DNS server accepts remote rndc commands regardless if authentication is configured. Note that this is not enabled by default. A remote attacker who can cause a server to make a query deliberately chosen to generate a response containing a signature record which would trigger a failed assertion and cause named to stop. Disabling DNSsec does not provide protection against this vulnerability.

FBI threatens to Force Apple to Hand Over iOS Source Code

The Department of Justice (DoJ) has warned Apple that it may force the tech giant for handing over the source code to the complete operating system if it does not help the Federal Bureau of Investigation (FBI) unlock the San Bernardino shooter’s iPhone.

Apple is battling with the FBI over iPhone encryption case. The federal investigators needs Apple’s assistance to unlock an iPhone 5C