What is Poodle !

October 16th, 2014

First there was Heartbleed, then Shellshock, and now Poodle, yet another serious security vulnerability in yet another widely used piece of software that went unnoticed for years.

This time, the Poodle vulnerability — which stands for Padding Oracle On Downloaded Legacy Encryption — was found in a 15-year-old web encryption technology called SSL 3.0. SSL, which stands for Secure Sockets Layer, is the technology that encrypts a user’s browsing session, making it difficult for anyone using the public Wi-Fi at Starbucks, for instance, to eavesdrop. The Poodle bug makes it possible for hackers to hijack their victim’s browsing session and do things like take over their email, online banking, or social networking account.

Three researchers at Google, Bodo Möller, Thai Duong, Krzysztof Kotowicz, disclosed details of a Poodle attack in a report last month.

Rumors of the bug have leaked over the last few days, prompting the OpenSSL Project, which develops the most widely used type of SSL encryption software, to publish the report on Tuesday. The advisory prompted makers of web browsers, and server software, as well as some technology companies, to disable support for SSL 3.0.

Poodle marked the third major discovery of a bug in a widely used technology this year. In April, researchers uncovered Heartbleed, a bug that made it possible for attackers to steal data from a server, including the keys to decode any encrypted contents. Then, last month, researchers uncovered Shellshock,a more serious bug that made it possible for hackers to take control of millions of machines around the world, unnoticed.

Security researchers say that the Poodle bug is more innocuous than Heartbleed or Shellshock. For one, they note that SSL 3.0 has been largely superseded by a newer encryption protocol called Transport Layer Security, or TLS. Also, to pull off an a Poodle attack, security researchers say that the victim has to be actively online and physically close to the attacker — say, using the same public Wi-Fi.

“Poodle requires a specific physical location and an active connection before an attack is practical,” said Karl Sigler, the threat intelligence manager at the security company Trustwave.

On Tuesday, Microsoft advised users to disable SSL 3.0 on Windows for servers and PCs.

Bodo Möller, one of the three Google researchers who discovered the bug, suggested a workaround on Google’s blog to secure web servers, but added that Google would remove support for SSL 3.0 from future customer software.

Mozilla said it would disable SSL 3.0 in the next version of the Firefox browser, which it plans to release on Nov. 25, and suggested browsers and websites turn off the feature in the meantime. Other companies, like Twitter, said they had disabled support for SSL 3.0 and that some users may need to update their browsers to use the service.

5 million Gmail accounts along with password hacked

September 11th, 2014

The details were posted on bitcoin forum btcsec.com by a user named Tvskit. The user said that approximately 60 percent of the passwords are still active but Google refuted the claim and said that only 2 percent of the passwords still work and also said that its automated anti-hijacking systems would have blocked many of […]

How to stop sneezing using home remedies

August 31st, 2014

A number of things can trigger sneezing. Whether it’s an allergy to pollen or mold or you’re suffering from a cold, sneezing continuously can leave your nose feeling sore and irritated. The more inflamed your nasal passages are, the more you will sneeze, so the circle never stops. While many over-the-counter medications can help stop […]

Ice Bucket Challenge ALS Donations Break $50 Million Mark

August 22nd, 2014

The organization raised $64 million in all of 2013 The Ice Bucket Challenge is the gift that keeps on giving for the ALS Association. The organization raised more than $10 million on Thursday alone, it said, bringing its total haul since July 29 to $53 million. For comparison’s sake, the group raised $2.2 million during […]

11 Firsts In Internet History

August 22nd, 2014

People on the Internet love firsts. I can only conclude this based on the number of comment threads that begin with someone writing “First!”  So I went on a hunt for 11 Internet firsts and found some really interesting ones… although, sadly, I was unable to track down the first time someone left the first […]

MAD GB WEB HOSTING – FAST PERFORMANCE HOST

August 20th, 2014

Few days back we decided to investigate web hosting companies and we found MAD GB . MAD GB is a web hosting company located in India . They provide robust web hosting service with CDN network enabled for each client they have on their server . This makes them a fast web host . While […]

Narendra Modi Office Contact Address, Phone Number, Email, Website

August 18th, 2014

Narendra Modi New Delhi based contact details are mentioned on this page. Current he is serving as Prime Minister of India. The information includes address, phone number, fax number, email ID with reference of the official website. It will help you to contact the officials of the CM house easily.  Mr. Narendra Modi, currently serving as […]

Aam aadmi party – lokpaal strategy

December 15th, 2013

Arvind Kejriwal’s Aam Aadmi Party wrote to Congress President Sonia Gandhi and BJP chief Rajnath Singh earlier this week, seeking to make their stand clear on 18 issues including the formation of the anti-corruption Jan Lokpal and audit of power companies. The VIP culture should be stopped in Delhi. No MLA, minister or Delhi official […]

Windows 8 vs Windows 8.1 – Difference

October 20th, 2013

Microsoft has made Windows 8.1 Preview available to download – although UK users will still have to wait a day or so before devices can be upgraded. The firm ran through some of the key features of Windows 8.1 Preview at its Build conference, in San Francisco. We take a look at the key differences between the full […]

How to Unlock the Memory Card in a Nokia Mobile

October 17th, 2013

  The Nokia mobile phone can be used for multimedia and other storage functions. The handset saves all items, such as music and pictures, to a memory card instead of the built-in storage. Memory cards such as a microSD can be locked to prevent unwanted access to your private items. The card cannot be used […]


Google+