News & Information for Technology Purchasers NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
This ad will display for the next 20 seconds. Click for more information, or
Home Enterprise I.T. Cloud Computing Applications Hardware More Topics...
World Wide Web
Is your endpoint data protected?
Average Rating:
Rate this article:  
Resetting All Passwords Now May Be Worst Heartbleed Fix

Resetting All Passwords Now May Be Worst Heartbleed Fix
By Jennifer LeClaire

Share
Share on Facebook Share on Twitter Share on Linkedin Share on Google Plus

When it comes to Heartbleed, top global sites should be extra vigilant for an expected rush of fraud-staging activities and social engineering attempts through call centers as fraudsters take advantage of an elevated volume of password resets to fit into the 'noise of the crowd.' The best protection against Heartbleed is additional layered security.
 


Heartbleed. It’s going to go down in history as one of the worst bugs ever. Heartbleed could give hackers access to user passwords and even trick people into using fake versions of popular Web sites.

Security engineers at Codenomicon who found the bug are reporting that the vulnerability is in the OpenSSL cryptographic software library. The weakness, they said, steals information typically protected by the SSL/TLS encryption used to secure the Internet.

But is changing all your passwords the right response? According to independent security analyst Graham Cluley, it’s not always the best move.

“The danger is that if you change your passwords before a Web site has been fixed, you might actually be exposing your credentials to greater risk of being snarfled up by people exploiting the vulnerability in the buggy versions of OpenSSL,” he wrote in a blog post. “Don’t forget -- there are an awful lot more people now testing to see how well the vulnerability can be exploited now that details are public. Sadly, mainstream media are proving to be a little guilty of parroting the advice of the likes of Tumblr.”

Back to Online Identity Basics

We caught up with Matt Willems, a labs engineer at security software firm LogRhythm, to get his take on the password issue. He told us, first of all, that Heartbleed allows attackers to see a portion of the contents of memory of the vulnerable server.

“This may be garbage or useless data, but it could be usernames and passwords of users and administrators or other sensitive data,” Willems said. “This particular vulnerability still exists in many locations, so changing your password may just mean that the new password is vulnerable.”

As Willems sees it, the strongest advice is to follow normal best practices for online identity information. That, he said, means changing your passwords regularly and if an online service says your information may be at risk, follow their directions.

“Service providers and anyone using OpenSSL should immediately upgrade to OpenSSL 1.0.1g. Both open source and commercial software have seen these types of vulnerabilities in the past and will continue to in the future,” Willems said. “One of the big differences is that open source software vulnerabilities tend to be discovered by a community and quickly patched while commercial software vulnerabilities are often patched behind the scenes.”

A Recipe for Disaster

We also turned to Mike Gross, global risk strategy director at IT security firm 41st Parameter, to see where he stands on the password change issue. He told us the solution is not a simple silver bullet fix or inconvenient password reset that will undoubtedly generate its own set of customer service costs and issues. (continued...)

1  |  2  |  Next Page >

 

Tell Us What You Think
Comment:

Name:



Get Powerful App Acceleration with Cisco. In a world where time is money, you need to accelerate the speed at which data moves through your data center. Cisco UCS Invicta delivers powerful, easy-to-manage application acceleration for data-intensive workloads. So you can make decisions faster and outpace the competition. Learn More.


 World Wide Web
1.   Twitter May Remove Pics of Deceased
2.   Google IPO Began Decade of Big Bets
3.   Assange Talks of Leaving Embassy
4.   Russian Hacker To Be Held Until Trial
5.   Online Sites vs. Retailing in India


advertisement
OkCupid Experiments with Daters
Unethical without user consent?
Average Rating:
Twitter May Remove Pics of Deceased
Balancing privacy and public interest.
Average Rating:
Online Retailers Ponder Actual Stores
'Click-and-mortar' shops popping up.
Average Rating:
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
Researchers Find Malicious Android Apps Can Hack Gmail
A new study shows that a weakness in the Android mobile operating system can be used to steal sensitive, personal info from unwitting users. Gmail proved to be the easiest app to attack; Amazon, the hardest.
 
UPS Stores in 24 States Hit by Data Breach
Big Brown has been breached. UPS said that about 105,000 customer transactions at 51 of its UPS Store locations in 24 states could have been compromised between January and August.
 
Cost of Target Data Breach: $148 Million Plus Loss of Trust
The now infamous Target data breach is still costing the company -- and its shareholders -- plenty. In fact, the retailing giant forecast the December 2013 incident cost shareholders $148 million.
 

Enterprise Hardware Spotlight
Acer's New Desktop Box Rides the Chrome OS Wave
Filling out its Chrome OS line, Acer is following the introduction of a larger Chromebook line earlier this month with a new tiny $180 desktop Chromebox and also a smaller Chromebook.
 
Feds OK $2.3 Billion IBM-Lenovo x86 Server Deal
IBM and Lenovo are celebrating U.S. approval of their x86-based server deal, having cleared some major security hurdles. The deal makes Lenovo a major player for enterprise data centers.
 
Three New Lenovo PCs Aimed at Business Users
With businesses wanting computing solutions that do more for less money, Lenovo has unveiled three new desktop PCs that it says offer solid computing at a budget-minded price.
 

Mobile Technology Spotlight
Screen Shortage Briefly Puts Brakes on iPhone 6
RAM? Check. Antenna switch? Check. Screen? Oops. Parts suppliers for Apple have found themselves facing a shortage of screens for the new iPhone 6 as next month's release date for the new smartphone looms.
 
Bounty Offered to Coders for Oculus Rift Bugs
Coders who find bugs in software for the Oculus Rift VR immersive headset could receive a reward of at least $500 under Facebook's White Hat bounty program. Facebook acquired Oculus in March.
 
Google Glass Adds Voice Access to Phone Contacts
The latest update to Google Glass will let users access their top 20 phone contacts with voice commands alone. A user can then choose a phone call, Google hangouts, e-mail or text messaging.
 

Navigation
NewsFactor Network
Home/Top News | Enterprise I.T. | Cloud Computing | Applications | Hardware | Mobile Tech | Big Data | Communications
World Wide Web | Network Security | Data Storage | CRM Systems | Microsoft/Windows | Apple/Mac | Linux/Open Source | Personal Tech
Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.