Google security engineer Tavis Ormandy disclosed an information leakage vulnerability in Cloudfare, a US CDN service provider. In addition to affecting Uber, password management software 1password, sports bracelet company FitBit and many other companies, this leakage also involved digital currency trading platforms, including the famous foreign P network (Poloniex). Some commentators said that the Cloudflare incident was the most serious information security leak in cloud services in recent years, and its impact may exceed that of the SHA-1 collision attack. According to the latest announcement from P.com:
It is reported that Cloudfare's engineers made a fatal error in the code that caused a memory leak and leaked the user's HTTPS session for months. The Cloudflare incident may become the most serious information security leak in cloud services in recent years. The leaked information has been cached by various crawlers, and the cache may contain a large amount of plaintext username and password information. Google engineers were able to discover this vulnerability because they found sensitive information in the contents of Google cache. It is currently reported that Google engineers have to work overtime on weekends to write tools to clean up sensitive information in Google cache data. What is Two-Factor Authentication (2FA)?Two-factor authentication (2FA) is a security process where users must provide two pieces of identification before logging into their accounts. For two-factor security, one is your password and the other is a unique code generated by an authentication app installed on your smartphone. The two most popular authentication apps are Google Authenticator and Authy. Here is a brief introduction on how to install and use Google Authenticator (using Apple devices as an example). RequireTo use Google Authenticator on your iPhone, iPod Touch, or iPad, you must have iOS 5.0 or later. Additionally, to set up the app on your iPhone using a QR code, you must have an iPhone 3G or later. Download the app
Set up the app
|
The sinister villain Friends are people’s conscio...
The dynamic adjustment mechanism of Bitcoin minin...
Binance Smart Chain (BSC), which was once very po...
If some women are lucky in love, then what kind o...
The ancients believed that if a mole grew on the c...
Is it good to have a broken eyebrow? Eyebrows tha...
Your ears interpret your fame The ears represent ...
Generally speaking, you should not eat too much l...
Antminer S17 Pro is the latest generation of Antm...
As one of the traditional physiognomy techniques, ...
On October 26, Ben, the founder of imToken, share...
What your nose bridge reveals about your health I...
Several moles that are likely to cause bad luck i...
From a health perspective, a sunken forehead indi...
A thick palm with sufficient capital This type of...