Sat.Jan 24, 2015 - Fri.Jan 30, 2015

article thumbnail

Linux Ghost Vulnerability: A GHOST in the….Linux….Wires

NopSec

Our partner Qualys discovered a new vulnerability nick-named “GHOST” (called as such because it can be triggered by the GetHOST functions) and worked with most of the Linux operating system distributions to patch it as of January 27th 2015. The GHOST vulnerability is a serious weakness in the Linux glibc library. It allows attackers to remotely take complete control of the victim system without having any prior knowledge of system credentials.

DNS 52
article thumbnail

Minding the Data Protection for Individuals

Spinone

Since we live in a digital world, we are so familiar with all privacy laws and its boundaries. All the news are full of caution not to be hacked, not to put easy passwords, and so on. Definitely, security is the top priority for brand companies to defend their critical data and reputation. Yet, we are more curious about if it’s important at all for individual users to care about hackers, or any other way of their data loss.

Backups 40
article thumbnail

Detecting the GHOST glibc Vulnerability with Unified VRM

NopSec

In the previous blog post here, we described the GHOST Linux glibc vulnerability in details and its repercussions to the affected systems in terms of risk. NopSec Unified VRM helps identify the Linux GHOST glibc vulnerabilities in various flavors of Linux, performing authenticated scans. Furthermore, Linux authenticated scan can be performed using SSH through username / password and certificate as well.