OpenSSL: The key failure in the world of Internet security


Europe, 04/11 April 2014 -. Black week live on the Internet, due to security breach “Hearbleed” detected on Monday 7 April. Each day, new data shows. Today, just read in the technology section of the New York Times the following analysis:

“When the Heartbleed bug was disclosed on Monday, the attention focused on the fallout for major Internet companies like Yahoo and Amazon. But security experts said the potential for harm could extend much further, to the guts of the Internet and the many devices that connect to it. By Thursday, some of the companies that make those devices began revealing whether they had been affected. Cisco Systems, the dominant provider of gear to move traffic through the Internet, said its big routers and servers, as well as its online servers — a big business — were not affected. If they had been, that would have had a significant impact on virtually every major company that connects to the Internet. Certain products the company makes were affected, it said — some kinds of phones that connect to the Internet, a kind of server that helps people conduct online meetings, and another kind of device used for office communications. Cisco also posted a list of products it had examined for the vulnerability, which it was updating as it continued inspecting its equipment. A Cisco rival, Juniper Networks, also said its main products were not affected. The only problem it found was in a kind of device for creating private communications on the Internet. “Besides one product, the exposure for our customers is minimal, if any,” said Michael Busselen, vice president of corporate communications at Juniper. Chuck Mulloy, a spokesman for Intel, said his company had been looking through its products for vulnerabilities for several days and so far had found nothing. He said, however, that the search was not yet done. Qualcomm, a maker of mobile technology, said it was still checking its products.

The Heartbleed flaw was found in the method known as OpenSSL that helps encrypt information on the Internet. For most people, the web — with sites like Facebook and Google — is the most visible part of the Internet. But hardware like home routers and printers is also connected to the Internet, and OpenSSL is built into some of this hardware. “That’s why this is so nasty,” said George Kurtz, chief executive of CrowdStrike, a security firm. “OpenSSL goes far beyond just websites. It’s implemented in email protocols and all kinds of embedded devices.” Most of the equipment made by Cisco and Juniper was unaffected because the companies did not use OpenSSL for their encryption.

Security experts say personal home routers often incorporate OpenSSL, which could make them vulnerable. But they note that because many home routers are configured to block outside traffic, the risk of a hacker using the Heartbleed bug to lift data like passwords to online banking and email accounts is low. This is particularly so, they said, when there are still thousands of vulnerable websites where this data could be pulled from much more easily. Nevertheless, Mr. Kurtz said, users would be wise to check with their home router manufacturers to upgrade their devices if they want to be absolutely secure.Security researchers say that while hackers have been posting lists of vulnerable websites, there does not appear to have been an increase in black market sales of sensitive data, like passwords.

Security experts say that upgrading and cleaning up those systems, if they are affected, could take years. “It’s one thing to get all of these servers at Yahoo, Google and everyone else fixed, but it’s a whole other thing to get these embedded devices fixed up,” Mr. Kurtz said. “I don’t see them getting updated any time soon.”

In AndSoft made ​​significant investments to maintain optimal levels of safety in all our solutions, developed by transport companies and logistics. For any questions, please contact technical support AndSoft.

1 thought on “OpenSSL: The key failure in the world of Internet security”

Leave a Reply

Please log in using one of these methods to post your comment: Logo

You are commenting using your account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s