<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>VR World &#187; Google Security</title>
	<atom:link href="http://www.vrworld.com/tag/google-security/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.vrworld.com</link>
	<description></description>
	<lastBuildDate>Fri, 10 Apr 2015 07:54:22 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=4.1.1</generator>
	<item>
		<title>Google Discovers Vulnerability in SSL 3.0</title>
		<link>http://www.vrworld.com/2014/10/14/google-discovers-vulnerability-in-ssl-3-0/</link>
		<comments>http://www.vrworld.com/2014/10/14/google-discovers-vulnerability-in-ssl-3-0/#comments</comments>
		<pubDate>Tue, 14 Oct 2014 23:26:35 +0000</pubDate>
		<dc:creator><![CDATA[Anshel Sag]]></dc:creator>
				<category><![CDATA[Cloud Computing]]></category>
		<category><![CDATA[Enterprise]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Bodo Möller]]></category>
		<category><![CDATA[Fallback]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[Google Security]]></category>
		<category><![CDATA[Heartbleed]]></category>
		<category><![CDATA[Krzysztof Kotowicz]]></category>
		<category><![CDATA[OpenSSL]]></category>
		<category><![CDATA[POODLE]]></category>
		<category><![CDATA[Researchers]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[SSL]]></category>
		<category><![CDATA[SSL 3.0]]></category>
		<category><![CDATA[Thai Duong]]></category>

		<guid isPermaLink="false">http://www.brightsideofnews.com/?p=40072</guid>
		<description><![CDATA[<p>Google's security researchers have discovered a new bug within SSL, this time in SSL 3.0 that exploits the fallback to SSL 3.0 and its inherently insecurity</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/10/14/google-discovers-vulnerability-in-ssl-3-0/">Google Discovers Vulnerability in SSL 3.0</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img width="1000" height="389" src="http://cdn.vrworld.com/wp-content/uploads/2014/06/Google-Logo1.png" class="attachment-post-thumbnail wp-post-image" alt="Google Logo" /></p><p>Remember when security researchers <a title="The NSA Exploited the OpenSSL Heartbleed Bug for 2 Years" href="http://www.brightsideofnews.com/2014/04/11/the-nsa-exploited-the-openssl-heartbleed-bug-for-2-years/">found a vulnerability in OpenSSL</a> that potentially put the entire world at risk of having their data compromised? Well, Heartbleed appears not to be the end of these vulnerabilities. Well, Google has found another <a href="http://googleonlinesecurity.blogspot.com/2014/10/this-poodle-bites-exploiting-ssl-30.html" target="_blank">vulnerability in an older version of SSL</a>, in SSL 3.0. Thankfully, SSL 3.0 has mostly been replaced by TLS 1.0, TLS 1.1 and TLS 1.2 but many of those systems still have SSL 3.0 as a backup in the event of a need to support this legacy protocol.</p>
<p>Three Google security researchers <a href="https://www.openssl.org/~bodo/ssl-poodle.pdf" target="_blank">published a paper</a> back in September called <em>This POODLE bites: Exploiting the SSL 3.0 Fallback </em>in that document, Bodo Möller, Thai Duong and Krzysztof Kotowicz from Google basically state upfront that SSL 3.0 is obsolete and insecure and that&#8217;s why most companies, websites and overall the world no longer uses it. However, because some implementations keep SSL 3.0 as a legacy support feature, there are some security vulnerabilities that can be exploited as a result of this. They also say, by simply disabling SSL 3.0 you can completely avoid this vulnerability as a whole. They call the attack that happens as a result of the downgrade to SSL 3.0 the POODLE (Padding Oracle On Downgraded Legacy Encryption) which allows them to steal &#8220;secure&#8221; HTTP cookies or any bearer tokens.</p>
<p>If you can&#8217;t disable SSL 3.0 for one reason or another in your setup, then they&#8217;ve provided for a detailed solution which helps work around this fallback vulnerability. Realistically this is nowhere near as scary as Heartbleed or Shellshock which are more broadly vulnerable on more systems and create a much greater effect on the victim&#8217;s data. But nonetheless, this is something that system administrators need to address on their own secure implementations in order to ensure that they do not become exposed to this SSL 3.0 Poodle attack.</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/10/14/google-discovers-vulnerability-in-ssl-3-0/">Google Discovers Vulnerability in SSL 3.0</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.vrworld.com/2014/10/14/google-discovers-vulnerability-in-ssl-3-0/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

Content Delivery Network via Amazon Web Services: CloudFront: cdn.vrworld.com

 Served from: www.vrworld.com @ 2015-04-10 17:04:08 by W3 Total Cache -->