Data Security

Apple unaffected by Heartbleed, adds to sites patched list

Apple unaffected by Heartbleed, adds to sites patched list

This week the folks at Apple have added to the stacks of sites making clear that they were either unaffected by the Heartbleed bug or have been patched successfully. Apple has released a statement that suggests they "take security very seriously" and that iOS and OS X "never incorporated the vulnerable software" in the first place. They also made clear that "key web-based services were not affected" either.

Continue Reading

Your Heartbleed bug fix in three steps

Your Heartbleed bug fix in three steps

This week there’s little question that the internet security world has been tossed down a flight of stairs. With Heartbleed, a relatively major bit of a mistake was made in OpenSSL, a form of security that most of the internet uses, resulting in a major open door for hackers and spies of all kinds. With this bug having only been discovered this week and implemented a whopping two years ago, IT professionals are notably miffed.

Continue Reading

Heartbleed bug coder: it was a mistake

Heartbleed bug coder: it was a mistake

There should have been little doubt that once the Heartbleed bug was realized, one of the first things the public was going to do was go on a witch hunt for the person or people responsible. As it were, Mr. Robin Seggelmann of Münster in Germany says that he was only aiming to improve OpenSSL, and all allegations that he may have introduced the bug on purpose are false.

Continue Reading

Heartbleed bug: vulnerable and patched sites chime in

Heartbleed bug: vulnerable and patched sites chime in

When you think about the scope of the Heartbleed bug, you have to consider that it was (and is) allowing hackers to see data - any data - stored on servers. This data vulnerable to CVE-2014-0160 (aka Heartbleed) is not limited to certain kinds of data - it’s anything and everything. So what’s to be done?

Continue Reading

NSA leak reveals citizen targets: “I hunt sys admins”

NSA leak reveals citizen targets: “I hunt sys admins”

System administrators, tasked with the operation of computer systems, are unwitting potential targets for the NSA, new documents leaked by Snowden and detailed by The Intercept have revealed. According to these documents, the NSA targets the Facebook accounts and email addresses of sys admins, ultimately hacking into the systems they control -- hence one of the posts in the document reading, "I hunt sys admins."

Continue Reading