<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>VR World &#187; Heartbleed</title>
	<atom:link href="http://www.vrworld.com/tag/heartbleed/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.vrworld.com</link>
	<description></description>
	<lastBuildDate>Fri, 10 Apr 2015 07:54:22 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=4.1.1</generator>
	<item>
		<title>Google Discovers Vulnerability in SSL 3.0</title>
		<link>http://www.vrworld.com/2014/10/14/google-discovers-vulnerability-in-ssl-3-0/</link>
		<comments>http://www.vrworld.com/2014/10/14/google-discovers-vulnerability-in-ssl-3-0/#comments</comments>
		<pubDate>Tue, 14 Oct 2014 23:26:35 +0000</pubDate>
		<dc:creator><![CDATA[Anshel Sag]]></dc:creator>
				<category><![CDATA[Cloud Computing]]></category>
		<category><![CDATA[Enterprise]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Bodo Möller]]></category>
		<category><![CDATA[Fallback]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[Google Security]]></category>
		<category><![CDATA[Heartbleed]]></category>
		<category><![CDATA[Krzysztof Kotowicz]]></category>
		<category><![CDATA[OpenSSL]]></category>
		<category><![CDATA[POODLE]]></category>
		<category><![CDATA[Researchers]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[SSL]]></category>
		<category><![CDATA[SSL 3.0]]></category>
		<category><![CDATA[Thai Duong]]></category>

		<guid isPermaLink="false">http://www.brightsideofnews.com/?p=40072</guid>
		<description><![CDATA[<p>Google's security researchers have discovered a new bug within SSL, this time in SSL 3.0 that exploits the fallback to SSL 3.0 and its inherently insecurity</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/10/14/google-discovers-vulnerability-in-ssl-3-0/">Google Discovers Vulnerability in SSL 3.0</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img width="1000" height="389" src="http://cdn.vrworld.com/wp-content/uploads/2014/06/Google-Logo1.png" class="attachment-post-thumbnail wp-post-image" alt="Google Logo" /></p><p>Remember when security researchers <a title="The NSA Exploited the OpenSSL Heartbleed Bug for 2 Years" href="http://www.brightsideofnews.com/2014/04/11/the-nsa-exploited-the-openssl-heartbleed-bug-for-2-years/">found a vulnerability in OpenSSL</a> that potentially put the entire world at risk of having their data compromised? Well, Heartbleed appears not to be the end of these vulnerabilities. Well, Google has found another <a href="http://googleonlinesecurity.blogspot.com/2014/10/this-poodle-bites-exploiting-ssl-30.html" target="_blank">vulnerability in an older version of SSL</a>, in SSL 3.0. Thankfully, SSL 3.0 has mostly been replaced by TLS 1.0, TLS 1.1 and TLS 1.2 but many of those systems still have SSL 3.0 as a backup in the event of a need to support this legacy protocol.</p>
<p>Three Google security researchers <a href="https://www.openssl.org/~bodo/ssl-poodle.pdf" target="_blank">published a paper</a> back in September called <em>This POODLE bites: Exploiting the SSL 3.0 Fallback </em>in that document, Bodo Möller, Thai Duong and Krzysztof Kotowicz from Google basically state upfront that SSL 3.0 is obsolete and insecure and that&#8217;s why most companies, websites and overall the world no longer uses it. However, because some implementations keep SSL 3.0 as a legacy support feature, there are some security vulnerabilities that can be exploited as a result of this. They also say, by simply disabling SSL 3.0 you can completely avoid this vulnerability as a whole. They call the attack that happens as a result of the downgrade to SSL 3.0 the POODLE (Padding Oracle On Downgraded Legacy Encryption) which allows them to steal &#8220;secure&#8221; HTTP cookies or any bearer tokens.</p>
<p>If you can&#8217;t disable SSL 3.0 for one reason or another in your setup, then they&#8217;ve provided for a detailed solution which helps work around this fallback vulnerability. Realistically this is nowhere near as scary as Heartbleed or Shellshock which are more broadly vulnerable on more systems and create a much greater effect on the victim&#8217;s data. But nonetheless, this is something that system administrators need to address on their own secure implementations in order to ensure that they do not become exposed to this SSL 3.0 Poodle attack.</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/10/14/google-discovers-vulnerability-in-ssl-3-0/">Google Discovers Vulnerability in SSL 3.0</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.vrworld.com/2014/10/14/google-discovers-vulnerability-in-ssl-3-0/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Google Rolls Out Android 4.4.4 Update Right before Google IO</title>
		<link>http://www.vrworld.com/2014/06/23/google-rolls-android-4-4-4-update-right-google-io/</link>
		<comments>http://www.vrworld.com/2014/06/23/google-rolls-android-4-4-4-update-right-google-io/#comments</comments>
		<pubDate>Mon, 23 Jun 2014 23:12:59 +0000</pubDate>
		<dc:creator><![CDATA[Anshel Sag]]></dc:creator>
				<category><![CDATA[Android]]></category>
		<category><![CDATA[Mobile Computing]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Android 4.4.4]]></category>
		<category><![CDATA[Android 5]]></category>
		<category><![CDATA[Android Update]]></category>
		<category><![CDATA[Android Wear]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[Google IO]]></category>
		<category><![CDATA[Heartbleed]]></category>
		<category><![CDATA[Update]]></category>
		<category><![CDATA[wearables]]></category>

		<guid isPermaLink="false">http://www.brightsideofnews.com/?p=36127</guid>
		<description><![CDATA[<p>Many people have been awaiting Google&#8217;s Android 4.4.4 update which many expected would get rolled out at Google IO. They weren&#8217;t necessarily wrong since Google ...</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/06/23/google-rolls-android-4-4-4-update-right-google-io/">Google Rolls Out Android 4.4.4 Update Right before Google IO</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img width="1000" height="389" src="http://cdn.vrworld.com/wp-content/uploads/2014/06/Google-Logo1.png" class="attachment-post-thumbnail wp-post-image" alt="Google Logo" /></p><p>Many people have been awaiting Google&#8217;s Android 4.4.4 update which many expected would get rolled out at Google IO. They weren&#8217;t necessarily wrong since Google IO starts on Wednesday and there will probably be a lot of Android news in terms of new versions of the OS and improvements coming to it. However, many expected the Android Kit Kat 4.4.3 to 4.4.4 update to be fairly minor compared to other Android updates, and they were also correct to think so as the entire update was only 2.5 MB to download, as opposed to an entirely new OS image.</p>
<p>Over the course of the past few days, this update has been rolling out and most of the reports are indicating that this is mostly a security fix for the <a title="The NSA Exploited the OpenSSL Heartbleed Bug for 2 Years" href="http://www.brightsideofnews.com/2014/04/11/the-nsa-exploited-the-openssl-heartbleed-bug-for-2-years/">OpenSSL vulnerability</a> that patches the heartbleed exploit. There isn&#8217;t much else by ways of this update other than the fact that it may mean that any and all other Android devices that don&#8217;t have 4.4.4 are probably or possibly vulnerable. So, from that standpoint, that&#8217;s a bit concerning if you&#8217;re an Android user without a Nexus phone running Kit Kat 4.4.4. You can get the 4.4.4 update over the air via your carrier or you can download it directly from Google&#8217;s repository through the SDK and install it that way. However, that method should only be used by people that know how to flash a phone.</p>
<p>As Google IO starts up this week, we&#8217;ll probably see Android 4.5 news or possibly Android 5.0 which will likely incorporate a lot of major UI changes and all of the bugfixes from previous Android versions as well. Hopefully it won&#8217;t come with new hardware requirements (like memory) forcing new flagship phones to be 3 and 4 GB. However, I do believe we&#8217;ll hear a lot about 64-bit on Android in ways that we haven&#8217;t heard before. I think that Google is going to put a lot of focus on improving the core OS&#8217; functionality and adapting towards higher performance while also talking a lot about wearables and Android Wear.</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/06/23/google-rolls-android-4-4-4-update-right-google-io/">Google Rolls Out Android 4.4.4 Update Right before Google IO</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.vrworld.com/2014/06/23/google-rolls-android-4-4-4-update-right-google-io/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>The Whitehouse Says They Have Right to Withhold a Security Vulnerability</title>
		<link>http://www.vrworld.com/2014/05/01/whitehouse-says-right-withhold-security-vulnerability/</link>
		<comments>http://www.vrworld.com/2014/05/01/whitehouse-says-right-withhold-security-vulnerability/#comments</comments>
		<pubDate>Thu, 01 May 2014 18:49:57 +0000</pubDate>
		<dc:creator><![CDATA[Anshel Sag]]></dc:creator>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[CIA]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[Heartbleed]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[OpenSSL]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<category><![CDATA[Whitehouse]]></category>

		<guid isPermaLink="false">http://www.brightsideofnews.com/?p=34849</guid>
		<description><![CDATA[<p>On Monday, as a follow up to the awareness around the Heartbleed bug and all of the rumors that circulated around it, The Whitehouse posted ...</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/05/01/whitehouse-says-right-withhold-security-vulnerability/">The Whitehouse Says They Have Right to Withhold a Security Vulnerability</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img width="2000" height="1361" src="http://cdn.vrworld.com/wp-content/uploads/2014/05/WhiteHouse_Logo1.png" class="attachment-post-thumbnail wp-post-image" alt="Whitehouse Logo" /></p><p>On Monday, as a follow up to the awareness around <a title="The NSA Exploited the OpenSSL Heartbleed Bug for 2 Years" href="http://www.brightsideofnews.com/2014/04/11/the-nsa-exploited-the-openssl-heartbleed-bug-for-2-years/">the Heartbleed bug</a> and all of the rumors that circulated around it, <a href="http://www.whitehouse.gov/blog/2014/04/28/heartbleed-understanding-when-we-disclose-cyber-vulnerabilities" target="_blank">The Whitehouse posted a blog</a> clarifying their stance on how they approach vulnerabilities such as Heartbleed. In fact, the NSA categorically denied any knowledge of the<a href="https://twitter.com/NSA_PAO/status/454720059156754434" target="_blank"> Heartbleed bug officially on Twitter</a>, even though they have been known to lie to Congress and the American people without hesitation, so their honesty is a little more than at question.</p>
<p>So, what exactly are they going to disclose and when? Well, there&#8217;s a nifty little check list that the Whitehouse has provided us with so that we know when an agency should withhold information from the public and when it should make it public.</p>
<blockquote>
<p class="p1">We have also established a disciplined, rigorous and high-level decision-making process for vulnerability disclosure. This interagency process helps ensure that all of the pros and cons are properly considered and weighed. While there are no hard and fast rules, here are a few things I want to know when an agency proposes temporarily withholding knowledge of a vulnerability:</p>
</blockquote>
<ul>
<li class="p2">
<blockquote><p>How much is the vulnerable system used in the core internet infrastructure, in other critical infrastructure systems, in the U.S. economy, and/or in national security systems?</p></blockquote>
</li>
<li class="p2">
<blockquote><p>Does the vulnerability, if left unpatched, impose significant risk?</p></blockquote>
</li>
<li class="p2">
<blockquote><p>How much harm could an adversary nation or criminal group do with knowledge of this vulnerability?</p></blockquote>
</li>
<li class="p2">
<blockquote><p>How likely is it that we would know if someone else was exploiting it?</p></blockquote>
</li>
<li class="p2">
<blockquote><p>How badly do we need the intelligence we think we can get from exploiting the vulnerability?</p></blockquote>
</li>
<li class="p2">
<blockquote><p>Are there other ways we can get it?</p></blockquote>
</li>
<li class="p2">
<blockquote><p>Could we utilize the vulnerability for a short period of time before we disclose it?</p></blockquote>
</li>
<li class="p2">
<blockquote><p>How likely is it that someone else will discover the vulnerability?</p></blockquote>
</li>
<li class="p2">
<blockquote><p>Can the vulnerability be patched or otherwise mitigated?</p></blockquote>
</li>
</ul>
<p>&nbsp;</p>
<p>So, basically, The Whitehouse and the administration of Obama are basically saying that if a vulnerability doesn&#8217;t really affect us too much, but can gain us lots of valuable intelligence we should keep our mouths shut. What is interesting about this supposed &#8220;rigorous&#8221; process for vulnerability disclosure is that there is no time limit set for how long they are allowed to wait until they disclose a vulnerability. There is no limitation on how long they can leave a vulnerability open if it passes all of these checks that they&#8217;ve established. They mention utilizing the vulnerability for a short period of time, but that doesn&#8217;t actually mean anything because a short period of time could be a day, a week, a month, or a year.</p>
<p>With the Heartbleed bug and the public disclosure around it, there were a lot of companies scrambling to patch the bug and some attacks that utilized it immediately after its disclosure. However, if left unpatched, Heartbleed could have disasterous implications and would give any government with knowledge of it almost unlimited access across the web. As a result, many people simply don&#8217;t believe that The Whitehouse and the NSA were unaware of such a bug, especially since the NSA had quietly exploited countless other bugs continually without any concern.</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/05/01/whitehouse-says-right-withhold-security-vulnerability/">The Whitehouse Says They Have Right to Withhold a Security Vulnerability</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.vrworld.com/2014/05/01/whitehouse-says-right-withhold-security-vulnerability/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
		<item>
		<title>The NSA Exploited the OpenSSL Heartbleed Bug for 2 Years</title>
		<link>http://www.vrworld.com/2014/04/11/the-nsa-exploited-the-openssl-heartbleed-bug-for-2-years/</link>
		<comments>http://www.vrworld.com/2014/04/11/the-nsa-exploited-the-openssl-heartbleed-bug-for-2-years/#comments</comments>
		<pubDate>Fri, 11 Apr 2014 20:59:19 +0000</pubDate>
		<dc:creator><![CDATA[Anshel Sag]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Bloomberg]]></category>
		<category><![CDATA[Certificate]]></category>
		<category><![CDATA[Heartbeat]]></category>
		<category><![CDATA[Heartbleed]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[OpenSSL]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[SSL]]></category>
		<category><![CDATA[TLS]]></category>

		<guid isPermaLink="false">http://www.brightsideofnews.com/?p=34422</guid>
		<description><![CDATA[<p>According to a report coming out of Bloomberg, the NSA supposedly knew of the OpenSSL Heartbleed bug for nearly 2 years and used it to ...</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/04/11/the-nsa-exploited-the-openssl-heartbleed-bug-for-2-years/">The NSA Exploited the OpenSSL Heartbleed Bug for 2 Years</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img width="341" height="341" src="http://cdn.vrworld.com/wp-content/uploads/2014/04/NSAHeartbleed1.jpg" class="attachment-post-thumbnail wp-post-image" alt="NSAHeartbleed" /></p><p>According to <a href="http://www.bloomberg.com/news/2014-04-11/nsa-said-to-have-used-heartbleed-bug-exposing-consumers.html">a report coming out of Bloomberg,</a> the NSA supposedly knew of the <a href="https://www.openssl.org/news/secadv_20140407.txt">OpenSSL Heartbleed bug</a> for nearly 2 years and used it to their advantage when they needed to. This makes the entire belief that the bug was an accidental mistake in the code that hadn&#8217;t been noticed much less probable. Not to mention the fact that the heartbleed bug is effecting almost the entire internet and puts the security of most passwords into question. The problem, however, is that not enough websites have fixed their certificates to patch this issue. There are hundreds of thousands if not millions of affected sites that handle critical user email accounts, bank accounts and various other sensitive data. The day that the bug was found and announced a fix was also issued to resolve the issue, however, system administrators are slow to <a href="https://www.openssl.org/source/">implement the fix</a> as attacks are already supposedly under way.</p>
<p>In any case, it is advisable to change all of your passwords to sensitive accounts and to enable 2-step authentication as well, considering the fact that such issues could be discovered in the future and that you could be vulnerable until then, like now. The real truth of the matter is that this issue is an unfortunate situation and in today&#8217;s online world there is no doubt that one has to remain vigilant and stay on top of all potential security risks. It also doesn&#8217;t help that the NSA and CIA are building backdoors into hardware across the entire IT industry and that they are effectively building in backdoors for hackers to exploit if they figure out how and where to look. The fact that these governmental agencies are doing this in light of trying to claim that foreign companies cannot be trusted (see Huawei) is hypocritical at the very least and damaging to the US economy at the very most. There is no doubt in my mind that the government&#8217;s involvement in both covert espionage and industrial espionage is causing other countries to not want to do business with US companies, even if those companies have absolutely no knowledge of their insecurities.</p>
<p>As far as this Heartbleed bug goes, you should be mindful of your passwords and accounts and likely change them over the course of the next few days as companies update their OpenSSL and issue new certificates. Unfortunately, until then, you&#8217;re pretty much cannon fodder for any hackers that want to exploit this. So, be careful and enable 2-step authentication wherever possible, because even if they have your password, the likelihood that they ALSO have access to your phone is very narrow. However, some 2-step authenticaion does use email, so be careful of that and change your email passwords ASAP.</p>
<p>The post <a rel="nofollow" href="http://www.vrworld.com/2014/04/11/the-nsa-exploited-the-openssl-heartbleed-bug-for-2-years/">The NSA Exploited the OpenSSL Heartbleed Bug for 2 Years</a> appeared first on <a rel="nofollow" href="http://www.vrworld.com">VR World</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.vrworld.com/2014/04/11/the-nsa-exploited-the-openssl-heartbleed-bug-for-2-years/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

Content Delivery Network via Amazon Web Services: CloudFront: cdn.vrworld.com

 Served from: www.vrworld.com @ 2015-04-10 17:22:31 by W3 Total Cache -->