SlideShare una empresa de Scribd logo
1 de 14
OpenSSL Heartbleed Bug Leaves Much Of The Internet
At Risk
- TechCrunch
HeartBleed Vulnerability
Agenda:
1- Methodology of Heartbleed bug.
2- Risk of “HeartBleed”.
3- Most popular infected Systems.
4- Most popular infected mobile phones.
5- How to Protect your-self from HeartBleed BUG.
6- How to Protect your Enterprise infrastructure from
HeartBleed BUG.
7- Q&A
• At the root of Heart-bleed is “Encryption”.
• Internet has security protocols for securing
and encryption commonly known as
“SSL & TLS”.
• The most common implementation of SSL
and TLS is a set of open source tools
known as
“Open SSL”
Methodology of Heartbleed bug.
Open SSL run over
66% percent of the
secure internet flow
Even if you may not know how it looks like or what even means,
Probably you interact with it in daily basis
• The secret key “language” you
shared with the server it suddenly
accessible by somebody else &
flow is completely undetectable,
Simply That is “HeartBleed” the biggest and most
spread vulnerability threat over the history of
modern internet
Risk of “HeartBleed”.
“MAY 2012”
lot of software packages start to use
the vulnerable version
“December 2011”
this bug has been around .
Conclusion
SO for more than 2 years any
websites, Apps, banks and private
instant massaging that run open-SSL
had been vulnerable.
Here coming out some of the most popular social, email,
banking and e-commerce sites on the web. rounded up with
their responses below:
Most popular infected Systems.
Android 4.1.1 “Jelly Bean” Devices
are Vulnerable to Heartbleed.
Reverse Heartbleed is an important vulnerability to know
about as it could affect millions of users directly.
(If you’re wondering about iOS, Apple doesn’t ship its mobile operating system with OpenSSL, so everything is OK)
Most popular infected mobile phone.
1- Check Site Safety:
Test your server for Heartbleed (CVE-2014-0160)
Check any site where you enter confidential data
that you don’t want to share publicly
Qualys SSL Labs - Projects / SSL Server Test
 If the site has implemented the Heartbleed
patch, then log in and change your password
If you change your password and the site
hasn’t been patched, then you’re giving a
hacker a new password
 Be aware of complexity and length of the password
 Use a unique password for each site, don't
share passwords with multiple sites, and
don't reuse old passwords.
2- Update password
Would like to make sure that I can detect if someone tries to do a MAN-IN-
MIDDLE attack with a stolen certificate, which since has been revoked
3-Configure browser to detect revoked certificate
People using the old Android software should update their operating system,
People using Android version 4.1.1 should avoid sensitive transactions on
their mobile devices
The Heartbleed flaw might represent a real risk to 150 million Android users,
not because they're using a vulnerable version of Android but rather because
they are running a vulnerable app.
Heartbleed Puts 150 Million Android App Downloads at Risk
free detector appLookout built a that you can download to see if your Android is affected
4-Save your android device from HeartBleed
How to Protect your Enterprise infrastructure from HeartBleed BUG:
A. Firstly patch every SSL/TLS service.
B. Use the latest release of OpenSSL 1.0.1g in every in-house built.
C. Revoke digital SSL certificate.
E. Patch mobile devices .
F. Change login credentials.
E. Continuously vulnerability scan.
THANK YOU

Más contenido relacionado

Último

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Último (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 

Destacado

Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

Destacado (20)

Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
 

Heartbleed Bug: What It Is And How To Protect Yourself

  • 1. OpenSSL Heartbleed Bug Leaves Much Of The Internet At Risk - TechCrunch HeartBleed Vulnerability
  • 2. Agenda: 1- Methodology of Heartbleed bug. 2- Risk of “HeartBleed”. 3- Most popular infected Systems. 4- Most popular infected mobile phones. 5- How to Protect your-self from HeartBleed BUG. 6- How to Protect your Enterprise infrastructure from HeartBleed BUG. 7- Q&A
  • 3. • At the root of Heart-bleed is “Encryption”. • Internet has security protocols for securing and encryption commonly known as “SSL & TLS”. • The most common implementation of SSL and TLS is a set of open source tools known as “Open SSL” Methodology of Heartbleed bug.
  • 4. Open SSL run over 66% percent of the secure internet flow Even if you may not know how it looks like or what even means, Probably you interact with it in daily basis
  • 5. • The secret key “language” you shared with the server it suddenly accessible by somebody else & flow is completely undetectable, Simply That is “HeartBleed” the biggest and most spread vulnerability threat over the history of modern internet Risk of “HeartBleed”.
  • 6. “MAY 2012” lot of software packages start to use the vulnerable version “December 2011” this bug has been around . Conclusion SO for more than 2 years any websites, Apps, banks and private instant massaging that run open-SSL had been vulnerable.
  • 7. Here coming out some of the most popular social, email, banking and e-commerce sites on the web. rounded up with their responses below: Most popular infected Systems.
  • 8. Android 4.1.1 “Jelly Bean” Devices are Vulnerable to Heartbleed. Reverse Heartbleed is an important vulnerability to know about as it could affect millions of users directly. (If you’re wondering about iOS, Apple doesn’t ship its mobile operating system with OpenSSL, so everything is OK) Most popular infected mobile phone.
  • 9. 1- Check Site Safety: Test your server for Heartbleed (CVE-2014-0160) Check any site where you enter confidential data that you don’t want to share publicly Qualys SSL Labs - Projects / SSL Server Test
  • 10.  If the site has implemented the Heartbleed patch, then log in and change your password If you change your password and the site hasn’t been patched, then you’re giving a hacker a new password  Be aware of complexity and length of the password  Use a unique password for each site, don't share passwords with multiple sites, and don't reuse old passwords. 2- Update password
  • 11. Would like to make sure that I can detect if someone tries to do a MAN-IN- MIDDLE attack with a stolen certificate, which since has been revoked 3-Configure browser to detect revoked certificate
  • 12. People using the old Android software should update their operating system, People using Android version 4.1.1 should avoid sensitive transactions on their mobile devices The Heartbleed flaw might represent a real risk to 150 million Android users, not because they're using a vulnerable version of Android but rather because they are running a vulnerable app. Heartbleed Puts 150 Million Android App Downloads at Risk free detector appLookout built a that you can download to see if your Android is affected 4-Save your android device from HeartBleed
  • 13. How to Protect your Enterprise infrastructure from HeartBleed BUG: A. Firstly patch every SSL/TLS service. B. Use the latest release of OpenSSL 1.0.1g in every in-house built. C. Revoke digital SSL certificate. E. Patch mobile devices . F. Change login credentials. E. Continuously vulnerability scan.