[CentOS] FLASH NewsBites - Heartbleed Open SSL Vulnerability (fwd)

Connie Sieh

csieh at fnal.gov
Wed Apr 9 18:44:48 UTC 2014


For even more information about "Heartbleed".

-Connie Sieh

---------- Forwarded message ----------
Date: Wed, 9 Apr 2014 12:27:54 -0500
From: The SANS Institute <NewsBites at sans.org>
Subject: FLASH NewsBites - Heartbleed Open SSL Vulnerability

FLASH NewsBites - Heartbleed Open SSL Vulnerability

FLASH NewsBites are issued only when a security event demands global and
immediate action.  The HeartBleed Open SSL vulnerability fits that
description.

Proof: More than 200 students at SANS 2014 in Orlando this week spent 2
hours in a briefing on Heartbleed last night after full days of classes.
This one matters.

Tonight at 8:15 SANS faculty member Jake Williams will present a
briefing explaining the HeartBleed vulnerability and what it means to
you. Jake says: "Another 24 hours have passed since the initial
presentation and we know more about what is vulnerable and what isn't.
Even if you attended the short presentation last night at #SANS2014,
this is a don't miss event."

Jake will cover the actual structure of the vulnerability, methods for
detection, and what you need to do (both as a systems admin and an end
user). Jake will also perform live demos against a vulnerable server so
you see first hand what can be exposed. Finally, we'll be releasing
packet captures containing the exploit (suitable for testing your IDS
rules).

Register at:
https://www.sans.org/webcasts/openssl-heartbleed-vulnerability-98105

Jake Williams, a principal consultant at CSRgroup Computer Security
Consultants, has over a decade of experience in secure network design,
penetration testing, incident response, forensics, and malware reverse
engineering. Prior to joining CSRgroup, he worked with various
government agencies in information security roles.

Jake has twice won the annual DC3 Digital Forensics Challenge and has
spoken at several regional ISSA meetings, Shmoocon, and the DC3
Conference, as well as numerous US government conferences.

Jake is currently pursuing a PhD in Computer Science where he is
researching new techniques for botnet detection. His research interests
include protocol analysis, binary analysis, malware RE methods,
subverting the security of cloud technologies, and methods for
identifying malware Command and Control (C2) techniques.




More information about the CentOS mailing list