sunrat Posted April 10, 2014 Share Posted April 10, 2014 Yeah ok, this is my 3rd post about Heartbleed, but at least this one is optimistic! 3 Link to comment Share on other sites More sharing options...
securitybreach Posted April 10, 2014 Share Posted April 10, 2014 Nice one! Link to comment Share on other sites More sharing options...
V.T. Eric Layton Posted April 10, 2014 Share Posted April 10, 2014 The NSA's brainwave scanner has been in operation for nearly three years already. All those cell towers you see around your area are not really cell towers. They're NSA brainwave scanner antennae. That's right. The NSA is tracking your every thought now. So, you know what I think about that? You don't? Well, the NSA sure as H3LL does. 2 Link to comment Share on other sites More sharing options...
V.T. Eric Layton Posted April 10, 2014 Share Posted April 10, 2014 Speaking of FUDD deliberately initiated in order to make $$$, check out this Wired article: Has the NSA Been Using the Heartbleed Bug as an Internet Peephole? Why even bother to publish something like this when the bottom line is succinctly summarized in just two sentences within the article? So far, though, there’s no evidence to suggest this is the case. And there are reasons why this method wouldn’t be very efficient for the NSA. Oh, yeah... to sensationalize in order to get website hits and magazine sales and increase advertisement income. I remember now. The day that news became a business was the end of news as a source of information that could be trusted. 1 Link to comment Share on other sites More sharing options...
Guest LilBambi Posted April 10, 2014 Share Posted April 10, 2014 Think the figured that out when JFK was killed, or even before ... Yes, we do need to look at the bright side ... Yahoo and Yahoo Flickr! were vulnerable, but Google apparently is not. Link to comment Share on other sites More sharing options...
Guest LilBambi Posted April 10, 2014 Share Posted April 10, 2014 So only criminal hackers would think to use script bots to hit a server repeatedly to get all the data possible, over and over, right? Link to comment Share on other sites More sharing options...
sunrat Posted April 10, 2014 Author Share Posted April 10, 2014 Why even bother to publish something like this when the bottom line is succinctly summarized in just two sentences within the article? So far, though, there’s no evidence to suggest this is the case. And there are reasons why this method wouldn’t be very efficient for the NSA. Oh, yeah... to sensationalize in order to get website hits and magazine sales and increase advertisement income. I remember now. Got you to read it, didn't it?! Thanks for the two line summary anyway. Saved me from reading it. 1 Link to comment Share on other sites More sharing options...
V.T. Eric Layton Posted April 10, 2014 Share Posted April 10, 2014 Yup. There are scores of pasty-faced once-human drones sitting before their flat screens in darkened cubicles across the newsrooms and magazine offices of the world who perform no other function than to create enticing and alluring headlines for articles written by the slightly more evolved species known as reporters. 1 Link to comment Share on other sites More sharing options...
frapper Posted April 10, 2014 Share Posted April 10, 2014 That looks more like the White House Press Office. 2 Link to comment Share on other sites More sharing options...
ross549 Posted April 10, 2014 Share Posted April 10, 2014 Has the NSA Been Using the Heartbleed Bug as an Internet Peephole? ....... So far, though, there’s no evidence to suggest this is the case. And there are reasons why this method wouldn’t be very efficient for the NSA. Clickbait.......... and nothing more. You have to take ALL news sources with a grain of salt. Do you know how many articles on Heartbleed I had to skim through before there was a FACTUAL explanation of the bug? http://gizmodo.com/how-heartbleed-works-the-code-behind-the-internets-se-1561341209/+ericlimer And on Gizmodo, no less! That alone is amazing. Adam 2 Link to comment Share on other sites More sharing options...
V.T. Eric Layton Posted April 10, 2014 Share Posted April 10, 2014 That was pretty interesting, iAdam. 1 Link to comment Share on other sites More sharing options...
crp Posted April 10, 2014 Share Posted April 10, 2014 not bad , i've seen a couple of other good ones from blogger types and IIRC on Monday night the first reports were pretty explicit and terse about the problem. but ... I think it was oversimplified just a bit and also doesn't address the issue of just because you got buffer data doesn't mean you can actually use it or that it has anything useful in the buffer. I'm going to believe this is overblown till I see someone give out proof of 'purloined' credentials. 'course it helps that none of our servers were effected. Link to comment Share on other sites More sharing options...
V.T. Eric Layton Posted April 10, 2014 Share Posted April 10, 2014 Well, with 18 pages of usernames and passwords from the last 14 years or so Internet use, I'm just sorry to say that I'm going to have to risk the security breach because there ain't no farkin' way that I'm going to go to each one of those sites and change my login information; particularly when their server admins may not have even fixed the issue yet... if they ever do. IIWII :'( 1 Link to comment Share on other sites More sharing options...
ross549 Posted April 10, 2014 Share Posted April 10, 2014 Yeah, hard to change so many in this case. I'm willing to bet that this was discovered but perhaps not exploited. I've heard from one company so far about the bug, and they stated thy were not affected. Adam 2 Link to comment Share on other sites More sharing options...
crp Posted April 11, 2014 Share Posted April 11, 2014 i would not be surprised if some financial institutions force users to create new passwords. 1 Link to comment Share on other sites More sharing options...
securitybreach Posted April 11, 2014 Share Posted April 11, 2014 Thanks Adam You guys are too much but spot on Link to comment Share on other sites More sharing options...
V.T. Eric Layton Posted April 11, 2014 Share Posted April 11, 2014 Yeah, hard to change so many in this case. I'm willing to bet that this was discovered but perhaps not exploited. I agree... with the exception of the NSA, of course. 1 Link to comment Share on other sites More sharing options...
Guest LilBambi Posted April 11, 2014 Share Posted April 11, 2014 Buffer overflow...never saw that before Link to comment Share on other sites More sharing options...
V.T. Eric Layton Posted April 11, 2014 Share Posted April 11, 2014 Bad situation just got worse... http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140409-heartbleed 1 Link to comment Share on other sites More sharing options...
Guest LilBambi Posted April 12, 2014 Share Posted April 12, 2014 Might want to check this topic in Security and Networking for additional info: http://forums.scotsnewsletter.com/index.php?showtopic=69051&view=getlastpost Link to comment Share on other sites More sharing options...
sunrat Posted April 14, 2014 Author Share Posted April 14, 2014 Please refer further discussion to the thread in Security And Networking - http://forums.scotsnewsletter.com/index.php?showtopic=69051&st=0 1 Link to comment Share on other sites More sharing options...
Recommended Posts