SSH

Stack-based buffer overflow bug found in glibc

Stack-based buffer overflow bug found in glibc

By

A popular open-source C library used by thousands of unix-like machines which defines the "system calls" is vulnerable to buffer-overflow attacks.

Dropbear SSH daemon doesn't authenticate users

By

A critical authentication bug has been discovered in Advantech's EKI series of Modbus-to-TCP/IP gateways.

Nine percent of HTTPS hosts on the web "share the same private keys"

Nine percent of HTTPS hosts on the web "share the same private keys"

By

Stefan Viehböck, senior security consultant at SEC Consult, examined 4000 devices from 70 vendors and found widespread reuse of private keys.

SSH inventor proposes best practice guidance in face of poor deployment and management of keys

SSH inventor proposes best practice guidance in face of poor deployment and management of keys

By

Management of secure shell (SSH) keys has become such a problem for businesses, that some spend ten per cent of their working time on remediation of them.

SSH Communications Security to release free assessment tool

By

SSH Communications Security has announced a free tool to scan and assess networks to provide a report on risk and compliance exposures in secure shell (SSH) environments.

Attacks on businesses could cost £260 million due to certificate and key issues

Attacks on businesses could cost £260 million due to certificate and key issues

By

Businesses do not get the concept of certificate management and there is a lack of trust between users, according to Venafi.

SC Webcasts UK

Sign up to our newsletters

FOLLOW US