Questions? Contact Us

 

Latest News

Featured News & Events

OpenSSL Vulnerability

A weakness has been discovered in the random number generator used by OpenSSL on Debian and Ubuntu systems. As a result of this weakness, certain encryption keys are much more common than they should be, such that an attacker could guess the key through a brute-force attack given minimal knowledge of the system. This particularly affects the use of encryption keys in OpenSSH.



This vulnerability only affects operating systems which (like Ubuntu) are based on Debian. However, other systems can be indirectly affected if weak keys are imported into them. We consider this an extremely serious vulnerability, and urge all users to act immediately to secure their systems.

The following Ubuntu releases are affected:

  • Ubuntu 7.04
  • Ubuntu 7.10
  • Ubuntu 8.04 LTS
  • Debian Etch 4.0
  • Debian Lenny 5.0

For more details visit these links:

We consider this an extremely serious vulnerability, and urge all users to act immediately to secure their systems.

Securing Xen in a Distributed Environment
Hosted Change Management

Related Posts

 

Tag Cloud

search Server Mangement log files business solutions Xen Information Technology security two factor authentication Internet Corporation credit cards stolen Geekend command line Debian amazon ec2 Windows GDPR VPS Servers cloud infrastructure spf vyatta router firewall filter security PCI HIPAA activesync eCommerce education shared folders safe computing SSL Small Business Hosting spam protect data computer security cyber liability insurance Hackers malicious software Announcement IT Services PCI IT security Email ipad anti virus World Backup Day trends HIPPA Positive Customer Impact Scalable Redundant Cloud Infrastructure employee training IT Solutions Cybersecurity Business Solutions iphone Car Hacking HIPAA solutions cloud PCI Data Security Standards Home Depot Breach DEF CON Healthcare Records Internet network intrusion detection data breach business community ZZ Servers information technology change Credit Card Security blackberry lamp Disaster Recovery Plan Medical Solutions businesses Medical Records Zendzian members area Credit Cards phishing attacks windows 7 qsa business motivation BSides PCI Service Provider INFOSEC IT cybersecurity permissions kerio HIDS passwords business solitions Shmoocon HIPAA data protection Charleston Web Hosting caller-id cyber InterWorx credit card embedded Compliance Linux assesment TLS compliance sender policy Firetalk ZZ Servers Co-Founder PCI Compliance data privacy security circles Business Solutions CentOs bash vulnerability scanning mail server logical security Interworx-CP Health Insurance Portability National Cyber Security Awareness Month vps pci complliant hosting PCI Solutions Security Accountability Act cell phone email PCI compliance Las Vegas IT solutions Cybersecurity Cloud Computing openssl black friday PCI Hosting Domani Names Payment Card Industry exchange support Assigned Names shared server Ubuntu personal information Alarm cli Business Planning credit card payment dsbl apache infrastructure phishing TiaraCon management PCI DSS 3.2 Presentation recovering data dss email accounts computing in the cloud computer networks hosting control panel cyber monday Continuous Monitoring multi-factor authentication DRP shared hosting QSA Online Business cyber monitoring cyber security IT services password Reports Control Panel teensy arduino compliant hosting OSSEC spoofing Sysadmin eCommerce Solutions small business health care providers Health Care Cybersecurity backup solutions physical security HIPAA Solutions video social engineering David Zendzian follow.The HIPAA Privacy Rule smartphone shared secure hosting Internet infrastructure ICANN PCI Audit healthcare solutions Vulnerability cyber protection physical