Jump to content

US Government Data May Be Exposed Due to Security Flaws - Piracy News and Crypto Updates - InviteHawk - Your Only Source for Free Torrent Invites

Buy, Sell, Trade or Find Free Torrent Invites for Private Torrent Trackers Such As redacted, blutopia, losslessclub, femdomcult, filelist, Chdbits, Uhdbits, empornium, iptorrents, hdbits, gazellegames, animebytes, privatehd, myspleen, torrentleech, morethantv, bibliotik, alpharatio, blady, passthepopcorn, brokenstones, pornbay, cgpeers, cinemageddon, broadcasthenet, learnbits, torrentseeds, beyondhd, cinemaz, u2.dmhy, Karagarga, PTerclub, Nyaa.si, Polishtracker etc.

US Government Data May Be Exposed Due to Security Flaws


Thakur
 Share

Recommended Posts

Undiscovered security flaws in a widely used corporate VPN software provided by Juniper Networks could have exposed sensitive data to foreign governments or criminal groups. The flaws were active for three years, and so far it remains unknown how the source code was altered, and whether it was the work of an external source or someone within the company.

Security experts found out that the flaws were in the form of unauthorized code discovered during a recent internal code review and announced on 17 December. One of them could have allowed hackers to decrypt data passing through Juniper’s devices, including equipment for a secure network. In other words, data that the VPN user thought was protected may have been spied on for the last three years.

According to reports, the FBI is also investigating the matter, which could be the work of a foreign government. Perhaps, the hack took advantage of weaknesses in the password encryption algorithm that were reportedly engineered by the NSA.

Juniper Networks announced that the company discovered unauthorized code in ScreenOS that could allow a third party to gain administrative access to NetScreen devices and to decrypt VPN connections. The company immediately developed and issued patched releases for the latest versions of ScreenOS, pointing out that so far no reports of these flaws being exploited have been received. Nevertheless, the company advised all its customers to update their systems and apply the patched releases.

Affected customers will potentially see an entry in the log file suggesting that “system” had logged in, and then see a password authentication. On the other hand, skilled hackers could be able to hide all traces of a login, so it is actually impossible to detect that the flaw was exploited.


 

Link to comment
Share on other sites

The last post in this topic was made more than 14 days ago. Only post in this topic if you have something valuable to add. Irrelevant posts are not allowed and you will be warned/banned for spamming old topics.

Guest
This topic is now closed to further replies.
  • Customer Reviews

  • Similar Topics

Ă—
Ă—
  • Create New...

Important Information

By using this site, you agree to our Terms of Use.