#381 Sep 29, 2014 – ShellShock – More dangerous than Heartbleed!

This week’s headline story: Shellshock – more dangerous than Heartbleed

bugA newly discovered security bug in a widely used piece of Linux software, named “Bash,” could pose a bigger threat to computer users than the “Heartbleed” bug that surfaced in April, cyber experts have warned. Bash is the software used to control the command prompt on many Unix computers. Hackers can exploit a bug in Bash to take complete control of a targeted system, security experts said. The Department of Homeland Security’s United States Computer Emergency Readiness Team, or US-CERT, issued an alert saying the vulnerability affects Unix-based operating systems including Linux and Apple’s Mac OS X. The Linux operating system is used on many computer systems from web servers to smartphones and appliances. Hackers have begun exploiting the vulnerability. Users of Linux based systems are advised to patch as soon as possible.

in other tech news:

First weekend sales of Apple’s new iPhone 6 and 6+ are off the charts, exceeding 10 million handests, double the amount of first weekend sales of the iPhone 5. But, unexpected issues put a damper on the celebration in Cupertino. The iOS 8 update wound up disrupting cellular connectivity, caused apps to crash, and disabled the Touch ID fingerprint reader used to unlock the device. The update was quickly pulled and replaced with iOS 8.0.2. In addition to software issues, a number of iPhone 6+ users are complaining that the large handset becomes bent over time when carried in tight pockets – a scenario that has been branded Bendgate. Some gullible iPhone 6 users have destroyed their new handsets following advice from a bogus ad claiming that the new phones are designed to be quick charged in a microwave! All the bad news caused Apple’s stock to fall nearly 3 percent last week.

and in Information Security news this week..

  • Lesson from Jimmy John’s Security Breach: Get Used to It [NewsFactor]Jimmy John’s has revealed a breach involving both credit and debit card data captured at some of its corporate-owned and franchised stores. Specifically, about 216 stores appear to be affected by the event. Early reports suggest that an intruder stole log-in credentials from Jimmy John’s point-of-sale vendor and used them to remotely access the point-of-sale systems at restaurant locations between June 16 and September 5, 2014.

and in Tech Industry news…

  • Social Network Ello Hopes To Ride Anti-Facebook Wave [NewsFactor]A new social network named Ello hopes to ride to popularity on the wave of discontent over Facebook privacy. “Your social network is owned by advertisers,” Ello said in the first line of its corporate manifesto. Ello claims that it is different. “You are not a product,” the company said, adding that the site will not carry ads or collect data on its users. Instead, Ello says it will make money by selling users premium themes and design tools for their personal pages. Access to Ello is by invite only. Ello says that around 27,000 people are signing up for invites every hour.
  • Confirmed: It’s Windows 9, and It Will Be Unveiled Tuesday [NewsFactor]The next version of Windows – Windows 9, will be unveiled this Tuesday at special Microsoft event. Microsoft is hoping for a winner as it faces slipping marketshare and a failed Windows 8.

and finally…

  • Paralyzed Rats Take 1,000 Steps, Orchestrated by Computer [TechnologyReview]Researchers in Switzerland are working to bring motion to the legs of Paraplegics. By tapping into the spinal cords of paralyzed lab rats, the researchers have been able to restore fluid, realistic walking motion using custom designed software. “It is a little bit Frankenstein,” admits neuroscientist Gregoire Courtine, but he hopes that the effort will make a big difference to the tens of thousands of individuals who experience spinal cord injuries each year.

Download the mp3 version of this post, or subscribe through the iTunes Store.

Sponsored by:

Cengage Learning Logo

© 2012 Cengage Learning, Inc. All rights reserved. Republication, reproduction or redistribution of Cengage Learning, Inc. (“Cengage Learning”) content, including by framing or similar means, is prohibited without the prior written consent of Cengage Learning. To request permission to photocopy, duplicate, republish or otherwise reuse Cengage Learning material, or for efiles for students with disabilities, go to www.cengage.com/permissions.

Leave a Reply

Your email address will not be published. Required fields are marked *