Don’t miss our next event

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed venenatis dignissim ultrices. Suspendisse ut sollicitudin nisi. Fusce efficitur nec nunc nec bibendum. Praesent laoreet tortor quis velit facilisis faucibus. Maecenas sollicitudin lectus diam, non vehicula arcu ullamcorper ac. In pharetra, est vitae interdum tincidunt, urna ligula rutrum tellus, sit amet pharetra purus magna eu enim. Sed iaculis imperdiet nisi, et pulvinar mauris gravida maximus. Phasellus vitae lorem at sem mattis volutpat. In eget dictum dui. Quisque nec sapien at massa mattis semper. Ut ac malesuada turpis. Fusce eu nulla vehicula, tincidunt dui ultrices, fermentum felis. Aliquam lectus nisi, feugiat ut aliquet sed, posuere sed libero.

Pellentesque consectetur massa nec nulla fermentum, at tincidunt elit volutpat. Duis vulputate placerat tortor, sit amet eleifend mauris tincidunt sit amet. Aliquam a maximus ligula. Phasellus nec sapien sed tellus tempor eleifend id a erat. Donec convallis bibendum posuere. Quisque mollis imperdiet malesuada. Suspendisse eget dictum massa.

Phasellus ac posuere nibh, in finibus nulla. In diam arcu, luctus sit amet condimentum sit amet, tristique et leo. Sed tincidunt justo a porttitor tristique. Nulla eu metus tincidunt, ornare magna ullamcorper, semper lacus. Quisque vitae porttitor odio, id tincidunt tellus. Fusce a suscipit eros. Proin sit amet risus fermentum, lobortis quam sed, consequat velit. Quisque sit amet ultricies lorem. Phasellus scelerisque ipsum eget ipsum posuere suscipit. Proin id molestie mauris, a venenatis ipsum. Quisque efficitur, nibh a dapibus mollis, metus tortor fermentum ante, non pellentesque mi magna non leo. Integer quis sem hendrerit, euismod dolor id, dapibus nulla. Maecenas non ultrices lorem. Pellentesque lobortis, diam eget feugiat lacinia, ante augue ullamcorper tortor, vel ornare sapien lacus pharetra quam.

Windows and FREAK

Turns out that Windows is not immune to the FREAK vulnerability.  FREAK (Factoring Attack on RSA-EXPORT Keys) allows weaker encryption to be used on SSL / TLS web sites. Basically, during the Clinton Administration, only the export of the 512 bit RSA key was allowed. In the US we could use the 1024 bit key. Web servers have held on to the legacy keys, which are now exploited. This is a server side fix, but users need to be aware if their bank has a vulnerable web site.

NCUA Auditors Loose NPPI

In a story posted by SC Magazine today, NCUA examiners lost a USB drive with NPPI from a credit union they were examining.



That isn’t the worst part:

“But the agency didn’t reveal that the thumb drive had been lost by one of its examiners until after news of the breach appeared in the press. The breach and the apparent secrecy around it generated concern that the NCUA does not have the proper safeguards in place for protecting sensitive data and prompted IG Hagen to say in a Monday statement that his office will audit the agency to determine why NCUA the breach remained mum until news of the breach became public as well as to uncover who leaked information to the press, according to a report in the Credit Union Journal.”

The implication is that the NCUA was attempting to cover up its ineptitude and got caught. While the IG investigation is nice, will this result in any changes at any of the regulators? I hope so.