Debian Linux Security Advisory 3513-1 – Several vulnerabilities have been discovered in the chromium web browser.
Monthly Archives: March 2016
Slackware Security Advisory – openssh Updates
Slackware Security Advisory – New openssh packages are available for Slackware 13.0, 13.1, 13.37, 14.0, 14.1, and -current to fix security issues.
FreeBSD Security Advisory – FreeBSD-SA-16:12.openssl
FreeBSD Security Advisory – A cross-protocol attack was discovered that could lead to decryption of TLS sessions by using a server supporting SSLv2 and EXPORT cipher suites as a Bleichenbacher RSA padding oracle. Note that traffic between clients and non-vulnerable servers can be decrypted provided another server supporting SSLv2 and EXPORT ciphers (even with a different protocol such as SMTP, IMAP or POP3) shares the RSA keys of the non-vulnerable server. This vulnerability is known as DROWN. Various other issues were also addressed.
Anti-DDoS Firm Staminus HACKED! Customers Data Leaked
Staminus Communications – a California-based hosting and DDoS (Distributed Denial of Service) protection company – is recovering a massive data breach after hackers broke down into its servers and leaked personal and sensitive details of its customers.
Though the company acknowledged that there was a problem in a message posted to Twitter on Thursday morning, it did not specify a data
![]()
FreeBSD Security Advisory – FreeBSD-SA-16:13.bind
FreeBSD Security Advisory – Testing by ISC has uncovered a defect in control channel input handling which can cause named to exit due to an assertion failure in sexpr.c or alist.c when a malformed packet is sent to named’s control channel (the interface which allows named to be controlled using the “rndc” server control utility). An error when parsing signature records for DNAME records having specific properties can lead to named exiting due to an assertion failure in resolver.c or db.c. A remote attacker can deliberately trigger the failed assertion if the DNS server accepts remote rndc commands regardless if authentication is configured. Note that this is not enabled by default. A remote attacker who can cause a server to make a query deliberately chosen to generate a response containing a signature record which would trigger a failed assertion and cause named to stop. Disabling DNSsec does not provide protection against this vulnerability.
Video: John Oliver Nails The Encryption Debate Perfectly
Florida Sheriff Pledges To Arrest Tim Cook Over Crypto Resistance
Error Exposes Emails On Code.org Website
Vulnerability Scanners Turn Up Mostly False Positives
FBI threatens to Force Apple to Hand Over iOS Source Code
The Department of Justice (DoJ) has warned Apple that it may force the tech giant for handing over the source code to the complete operating system if it does not help the Federal Bureau of Investigation (FBI) unlock the San Bernardino shooter’s iPhone.
Apple is battling with the FBI over iPhone encryption case. The federal investigators needs Apple’s assistance to unlock an iPhone 5C
![]()
