Questions? Contact Us


Latest News

Featured News & Events

OpenSSL Vulnerability

A weakness has been discovered in the random number generator used by OpenSSL on Debian and Ubuntu systems. As a result of this weakness, certain encryption keys are much more common than they should be, such that an attacker could guess the key through a brute-force attack given minimal knowledge of the system. This particularly affects the use of encryption keys in OpenSSH.

This vulnerability only affects operating systems which (like Ubuntu) are based on Debian. However, other systems can be indirectly affected if weak keys are imported into them. We consider this an extremely serious vulnerability, and urge all users to act immediately to secure their systems.

The following Ubuntu releases are affected:

  • Ubuntu 7.04
  • Ubuntu 7.10
  • Ubuntu 8.04 LTS
  • Debian Etch 4.0
  • Debian Lenny 5.0

For more details visit these links:

We consider this an extremely serious vulnerability, and urge all users to act immediately to secure their systems.

Securing Xen in a Distributed Environment
Hosted Change Management

Related Posts


Tag Cloud

vulnerability scanning anti virus hosting control panel ZZ Servers Co-Founder vyatta router firewall filter security PCI HIPAA change Credit Cards GDPR Medical Solutions business community recovering data DEF CON email accounts IT security Announcement eCommerce World Backup Day trends TLS HIPPA caller-id Internet infrastructure assesment Cybersecurity healthcare solutions Internet cyber monday compliance safe computing malicious software iphone Health Insurance Portability IT services Cloud Computing Domani Names Windows Scalable Redundant Cloud Infrastructure InterWorx VPS Servers logical security PCI DSS 3.2 BSides HIPAA Solutions Vulnerability Sysadmin backup solutions data breach PCI Audit Server Mangement Compliance spf ZZ Servers Control Panel cyber liability insurance Security apache Business Solutions business security HIPAA health care providers Internet Corporation PCI Service Provider cyber security pci complliant hosting SSL Assigned Names Business Planning IT Services arduino permissions computing in the cloud Cybersecurity Business Solutions National Cyber Security Awareness Month phishing attacks openssl Payment Card Industry Reports HIPAA solutions compliant hosting motivation data privacy ipad TiaraCon Home Depot Breach dsbl Geekend business solitions log files cyber command line PCI credit cards stolen Credit Card Security security circles employee training password kerio Medical Records cybersecurity black friday businesses Web Hosting OSSEC eCommerce Solutions cyber monitoring spoofing management mail server Presentation passwords Zendzian infrastructure shared secure hosting protect data small business Email bash Car Hacking David Zendzian qsa Ubuntu PCI Solutions credit card payment vps cli dss physical security Las Vegas PCI Hosting cloud infrastructure ICANN IT Solutions Charleston personal information two factor authentication shared folders IT Healthcare Records Hackers activesync intrusion detection spam lamp amazon ec2 physical Hosting QSA shared server Health Care Cybersecurity teensy smartphone Positive Customer Impact phishing blackberry Online Business Small Business CentOs Shmoocon Disaster Recovery Plan PCI compliance follow.The HIPAA Privacy Rule Linux social engineering information technology search credit card support PCI Data Security Standards multi-factor authentication exchange business solutions Interworx-CP cell phone email shared hosting windows 7 computer networks Firetalk PCI Compliance Xen Information Technology video INFOSEC IT solutions Debian Continuous Monitoring computer security members area data protection DRP HIDS education cloud sender policy network embedded cyber protection Accountability Act Alarm