Thursday 10 April 2014

Security Flaw Could Reach Beyond Websites to Digital Devices, Experts Say - New York Times



HTTP/1.1 302 Found Date: Fri, 11 Apr 2014 02:04:14 GMT Server: Apache Set-Cookie: NYT-S=0MS7D7Jyl7AKLDXrmvxADeHCfwjLKFCxgxdeFz9JchiAIUFL2BEX5FWcV.Ynx4rkFI; expires=Sun, 11-May-2014 02:04:14 GMT; path=/; domain=.nytimes.com Location: http://ift.tt/1hnycj2 Content-Length: 0 Cneonction: close Content-Type: text/html; charset=UTF-8 HTTP/1.1 200 OK Server: Apache Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 50311 Accept-Ranges: bytes Date: Fri, 11 Apr 2014 02:04:14 GMT X-Varnish: 2011937278 2011937001 Age: 4 Via: 1.1 varnish Connection: keep-alive X-Cache: HIT




Skip to content Skip to navigation



http://nyti.ms/1na50MR
See next articles See previous articles


Continue reading the main story Share This Page



When the Heartbleed bug was disclosed on Monday, the attention focused on the fallout for major Internet companies like Yahoo and Amazon. But security experts said the potential for harm could extend much further, to the guts of the Internet and the many devices that connect to it.


By Thursday, some of the companies that make those devices began revealing whether they had been affected.


Cisco Systems, the dominant provider of gear to move traffic through the Internet, said its big routers and servers, as well as its online servers â€" a big business â€" were not affected. If they had been, that would have had a significant impact on virtually every major company that connects to the Internet.


Certain products the company makes were affected, it said â€" some kinds of phones that connect to the Internet, a kind of server that helps people conduct online meetings, and another kind of device used for office communications. Cisco also posted a list of products it had examined for the vulnerability, which it was updating as it continued inspecting its equipment.


A Cisco rival, Juniper Networks, also said its main products were not affected. The only problem it found was in a kind of device for creating private communications on the Internet.


“Besides one product, the exposure for our customers is minimal, if any,” said Michael Busselen, vice president of corporate communications at Juniper.


Chuck Malloy, a spokesman for Intel, said his company had been looking through its products for vulnerabilities for several days and so far had found nothing. He said, however, that the search was not yet done.


Qualcomm, a maker of mobile technology, said it was still checking its products.


The Heartbleed flaw was found in the method known as OpenSSL that helps encrypt information on the Internet.


For most people, the web â€" with sites like Facebook and Google â€" is the most visible part of the Internet. But hardware like home routers and printers is also connected to the Internet, and OpenSSL is built into some of this hardware.


“That’s why this is so nasty,” said George Kurtz, chief executive of CrowdStrike, a security firm. “OpenSSL goes far beyond just websites. It’s implemented in email protocols and all kinds of embedded devices.”


Most of the equipment made by Cisco and Juniper was unaffected because the companies did not use OpenSSL for their encryption.


Security experts say personal home routers often incorporate OpenSSL, which could make them vulnerable. But they note that because many home routers are configured to block outside traffic, the risk of a hacker using the Heartbleed bug to lift data like passwords to online banking and email accounts is low. This is particularly so, they said, when there are still thousands of vulnerable websites where this data could be pulled from much more easily.


Nevertheless, Mr. Kurtz said, users would be wise to check with their home router manufacturers to upgrade their devices if they want to be absolutely secure.


Security researchers say that while hackers have been posting lists of vulnerable websites, there does not appear to have been an increase in black market sales of sensitive data, like passwords.


Security experts say that upgrading and cleaning up those systems, if they are affected, could take years.


“It’s one thing to get all of these servers at Yahoo, Google and everyone else fixed, but it’s a whole other thing to get these embedded devices fixed up,” Mr. Kurtz said. “I don’t see them getting updated any time soon.”


More on nytimes.com


Site Index









via Technology - Google News http://ift.tt/1qBHb0t

IFTTT

Put the internet to work for you.


via Personal Recipe 2598265


0 comments:

Post a Comment

 
Design by Free WordPress Themes | Bloggerized by Lasantha - Premium Blogger Themes | Online Project management