All articles| All Pictures| All Softwares| All Video| Go home page| Write articles| Upload pictures

Reading number is top 10 articles
造火箭和特斯拉不算啥,马斯克说目标是拯救世界 - 特斯拉,马斯克,Space X
那些不可思议的极限运动照片是怎么拍的? - 极限运动,摄影
揭秘《三体》走红互联网的真相 - 三体
Emoji不够多?Unicode或推出过敏食物表情 - Emoji,表情符号
Huawei France set up the second Institute of mathematics, strengthen basic research,
Taiwan Telecom fraud suspect: I knew city sentenced dare to do,
王思聪的IG俱乐部年会聚餐曝光:一顿吃了13万! - 王思聪,年会
搜狗搜索正式接入微信公众号 - 微信,搜狗搜索,微信公众号,搜狗
Do you need a cell phone? 1999 how to answer,
Samsung CES2014 make a fool of oneself, Nokia took the opportunity to make fun of,
Reading number is top 10 pictures
From China fortress sora aoi4
Li Zongrui hunting video screenshots1
生活中总有些低调的人,不经意间散发出土豪的气质
Players in the eyes of a perfect love2
NeedWallpaper9
姑娘手慢了,已经走光了
Beautiful Japanese beauty(漂亮的日本美女)3
2012 national geographic daily picture7
云南大理的美女
泳装名模阿尔贝特妮写真
Download software ranking
Dance with duck(male prostitution)
DreamWeaver8
Tram sex maniac 2 (H) rar bag13
Call Of Duty2
小黑猫大战两米大花蛇
Wild things 2
Unix video tutorial4
虚拟机汉化软件
超级战舰
Ashlynn Video5
归海一刀 published in(发表于) 2014/6/1 9:17:23 Edit(编辑)
Resurgence of bleeding heart vulnerability: borrowed WiFi, Android,

Resurgence of bleeding heart vulnerability: borrowed WiFi, Android,(心脏出血漏洞死灰复燃:借WiFi,坑安卓,)

Resurgence of bleeding heart vulnerability: borrowed WiFi, Android-bleeding heart, bleeding heart vulnerability Heartbleed,OpenSSL vulnerability-IT news Resurgence of bleeding heart vulnerability: borrowed WiFi, Android

Security company Codenomicon and Google security engineer found the "bleeding heart" (Heartbleed) vulnerability after exactly 7 weeks and submitted to the relevant regulatory authority, this vulnerability still seems to create problems for people. Portugal-gelanjiya Internet security researcher Lewis (Luis Grangeia) revealed that hackers can exploit this vulnerability by WiFi launched a similar attack.

It is reported that gelanjiya found in new form of attack is called "Cupid." "Cupid" aggressive steps and "bleeding heart" exactly the same, except that they to fly is not an open Web, but WiFi network attacks. For example, the vulnerability could allow hackers to intercept Android data communication between the device and the router. At the same time, hackers can also was informed that part of the information on the target device is stored in memory, which may lead to the user's personal authentication credentials, personal information was compromised.

At present, the gelanjiya had their findings published a research report, and urges the equipment vendors and network management upgrade its existing equipment as soon as possible.

Up to now, we don't know how many devices will be the impact of this vulnerability, it is believed that "Cupid" the negative impact than "bleeding heart" and much less. Analysts believe that most likely faced a similar vulnerability invasion are those that use Extensible Authentication Protocol (EAP) routers, this class of routers is usually requires a user name and password to be able to work properly, however, this vulnerability can be exploited "hearts bleeding" loophole to bypass the security mechanisms.

Gelanjiya another aspect of concern is currently running Android 4.1.1 equipment also face being subjected to "bleeding heart" the impact of the vulnerability. For example, a hacker could use this vulnerability to erect a public WiFi network, once the users phone when connected to this network, hackers could read data from the device. You can say for sure is, although many users have "hearts bleeding" vulnerability was first disclosed when upgrading a system, but there are still millions of great Android devices running this operating system.

Note: Heartbleed (bleeding heart) vulnerability in early April this year, security company Codenomicon engineer Andi·kajialai (Antti Karjalainen) during normal work, they stumbled across the Internet the largest-ever security vulnerabilities--Heartbleed (bleeding heart) vulnerability. Heartbleed vulnerability affects a widely-used open source OpenSSL encryption protocol SSL security suite. In short, this vulnerability can induce the server to its in-memory data overflow, which could enable a hacker to acquire the bug, and steal sensitive information such as credit card and password.


(

心脏出血漏洞死灰复燃:借WiFi,坑安卓 - 心脏出血,心脏出血漏洞,Heartbleed,OpenSSL漏洞 - IT资讯
心脏出血漏洞死灰复燃:借WiFi,坑安卓

在安全公司Codenomicon和谷歌安全工程师发现了“心脏出血”(Heartbleed)漏洞,并提交给相关管理机构整整7周后,这一漏洞似乎依旧在给人们制造问题。据葡萄牙互联网安全研究人员刘易斯-格兰吉亚(Luis Grangeia)透露,黑客可以利用这一漏洞通过WiFi展开类似的攻击行为。

据悉,格兰吉亚所发现的新型攻击形式被称为“Cupid”。“Cupid”的攻击步骤与“心脏出血”完全一致,只不过前者主要利用的不是开放Web,而是WiFi网络展开攻击。比如,该漏洞允许黑客截取Android设备和路由器之间的通信数据。同时,黑客也能够获悉目标设备存储在内存上的部分信息,因此而有可能导致用户的个人认证凭证、个人信息遭到泄露。

目前,格兰吉亚已经针对自己的发现发布了一份研究报告,并敦促设备供应商和网络管理方尽快升级自己的现有设备。

到目前为止,我们尚不清楚有多少设备会受到这一漏洞的影响,但相信“Cupid”所造成的负面影响要比“心脏出血”减轻许多。分析人士认为,最有可能遭遇类似漏洞入侵是那些采用可扩展认证协议(EAP)的路由器,这类路由器通常需要用户名和密码才能够正常工作,但这一漏洞却可以利用“心脏出血”漏洞绕过这一安全机制。

格兰吉亚所担心的另一个方面是,目前运行Android 4.1.1的设备也面临着遭受“心脏出血”漏洞的影响。比如,黑客可以利用这一漏洞架设一个公开的WiFi网络,一旦用户手机连接了这一网络后,黑客便有可能从设备中读取数据。可以肯定的是,虽然许多用户已经在“心脏出血”漏洞最先被披露的时候升级了系统,但目前仍然有数百万之巨的Android设备运行着该操作系统。

备注:Heartbleed(心脏出血)漏洞:今年4月初,安全公司Codenomicon的工程师安蒂·卡加莱能(Antti Karjalainen)在正常的工作时,却偶然发现了互联网史上最大的安全漏洞——Heartbleed(心脏出血)漏洞。Heartbleed漏洞影响了被广泛使用的开放源代码SSL安全套件OpenSSL的加密协议。简言之,这个漏洞可以诱使服务器将其内存中的数据溢出来,从而可能让黑客掌握这一漏洞,并进一步窃取诸如信用卡和密码等之类的敏感信息。


)


添加到del.icio.us 添加到新浪ViVi 添加到百度搜藏 添加到POCO网摘 添加到天天网摘365Key 添加到和讯网摘 添加到天极网摘 添加到黑米书签 添加到QQ书签 添加到雅虎收藏 添加到奇客发现 diigo it 添加到饭否 添加到飞豆订阅 添加到抓虾收藏 添加到鲜果订阅 digg it 貼到funP 添加到有道阅读 Live Favorites 添加到Newsvine 打印本页 用Email发送本页 在Facebook上分享


Disclaimer Privacy Policy About us Site Map

If you have any requirements, please contact webmaster。(如果有什么要求,请联系站长)
Copyright ©2011-
uuhomepage.com, Inc. All rights reserved.