The NSA advises the public to avoid data leaks from Heartbleed

Η NSA he is so worried about her of the data of each of us who issued a notice with suggestions on how to avoid leaking information due to the OpenSSL Heartbleed bug.


NSA-Heartbleed
It is really very ironic since we all now know that the πληροφοριών παρακολουθεί ότι κινείται στο δια and intercepts information.

So the NSA, which is concerned about our security, states that we should upgrade the TLS / dtls clients on the servers we use with the latest version of OpenSSL (1.0.1g) or run a recompile on the old version of OpenSSL with the option "DOPENSSL_NO_HEARTBEATS . ”

Continuing very seriously to be jealous of our NSA reports that many operating systems and clients in the server software run OpenSSL, that means they are vulnerable to Heartbleed. In this case, the secret service suggests that you contact the software vendor to see if there is a risk and ask for an update to fix things.

"For any systems that are affected by this vulnerability, use TLS/DTLS, and have exposure to it connectivity for potential exploitation of this vulnerability, revoke and reissue certificates and other credentials utilized on those systems after applying the update,” says the NSA guide.

It is suspected that the NSA knew about Heartbleed for years and kept it secret so that it could exploit the . After the latest releases revealing the vulnerability, the US Secret Service saw fit to let us know, keeping the pretense at least.

NSA

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.086 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).