ARCHIVED CONTENT
You are viewing ARCHIVED CONTENT released online between 1 April 2010 and 24 August 2018 or content that has been selectively archived and is no longer active. Content in this archive is NOT UPDATED, and links may not function.By Christopher Camejo
When we talk about “the next Heartbleed” we have to consider that new vulnerabilities are discovered every day and that many of them are just as widespread as Heartbleed. To put some bounds on this lets define a “supercritical” vulnerability that would have similar impact to Heartbleed as one that meets all of the following 4 criteria (all of which Heartbleed does meet): • Affects software that is in widespread use as an Internet-facing service that commonly handles sensitive data • Is present in version(s) of that software representing a sizable percentage of the deployed base • Can be […]
Read the original article at: Beyond Heartbleed: 5 Basic Rules To Reduce Risk