Torrent Invites! Buy, Trade, Sell Or Find Free Invites, For EVERY Private Tracker! HDBits.org, BTN, PTP, MTV, Empornium, Orpheus, Bibliotik, RED, IPT, TL, PHD etc!



Results 1 to 1 of 1
  1. #1
    Hand of the LAW
    FiDeLiTo's Avatar
    Reputation Points
    74675
    Reputation Power
    100
    Join Date
    Feb 2014
    Posts
    5,549
    Time Online
    90 d 19 h 22 m
    Avg. Time Online
    35 m
    Mentioned
    974 Post(s)
    Quoted
    565 Post(s)
    Liked
    5872 times
    Feedbacks
    490 (100%)

    Minecraft Servers Down After Web-Breaking OpenSSL Bug Discovered

    Hundreds of websites and servers are to be affected after the discovery of a web-breaking bug that makes an estimated two-thirds of all servers accessible to hackers. Passwords, bank details and more could be available to those that know how to get them, and it’s not just favourite websites that are affected. The Minecraft servers, for starters, have been temporarily shut down while developer Mojang looks into the problem.

    Notch took to Twitter to explain why people were having problems logging in, and asked them to be careful.


    Markus Persson
    We temporarily took down our servers due to this: http://arstechnica.com/security/2014...eavesdropping/ … A LOT of websites and services are affected by this. Be careful.

    3:54 PM - 8 Apr 2014
    Critical crypto bug in OpenSSL opens two-thirds of the Web to...
    By Dan Goodin @dangoodin001

    Exploits allow attackers to obtain private keys used to decrypt sensitive data.

    Ars Technica @arstechnica
    It’s unlikely that Mojang will be the only company good enough to close their servers while they research the problem this might cause for users, but they were certainly the first. They’ve reacted quickly, and it’ll be interesting to see how others react.

    The problem with the OpenSSL bug is that, even though it is now fixed, those that exploited it ahead of the patch may still be able to access the servers. For popular sites and games, it’s very possible someone decided to try to break into the servers and, if they knew this exploit, would still be able to do so.

    From Ars Technica:

    The bug, which is officially referenced as CVE-2014-0160, makes it possible for attackers to recover up to 64 kilobytes of memory from the server or client computer running a vulnerable OpenSSL version.


Tags for this Thread

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •