

ATM Skimming
February 13, 2012
Rewterz Releases Monthly Threat Intelligence Report on Attacks Targeting Pakistan’s Cyber Space
August 5, 2014
ATM Skimming
February 13, 2012
Rewterz Releases Monthly Threat Intelligence Report on Attacks Targeting Pakistan’s Cyber Space
August 5, 2014A vulnerability in OpenSSL could allow a remote attacker to expose sensitive data, possibly including user authentication credentials and secret keys, through incorrect memory handling in the TLS heartbeat extension. This may allow an attacker to decrypt traffic or perform other attacks. OpenSSL version 1.0.1g resolves this vulnerability. The 1.0.0 and 0.9.8 branches are not vulnerable.
Rewterz recommends users and administrators see the Heartbleed website for more details. Exploit code for this vulnerability is publicly available. Any service that supports STARTLS (imap,smtp,http,pop) may also be affected.