<body><script type="text/javascript"> function setAttributeOnload(object, attribute, val) { if(window.addEventListener) { window.addEventListener('load', function(){ object[attribute] = val; }, false); } else { window.attachEvent('onload', function(){ object[attribute] = val; }); } } </script> <div id="navbar-iframe-container"></div> <script type="text/javascript" src="https://apis.google.com/js/plusone.js"></script> <script type="text/javascript"> gapi.load("gapi.iframes:gapi.iframes.style.bubble", function() { if (gapi.iframes && gapi.iframes.getContext) { gapi.iframes.getContext().openChild({ url: 'https://www.blogger.com/navbar.g?targetBlogID\x3d13691723\x26blogName\x3daryveron\x26publishMode\x3dPUBLISH_MODE_BLOGSPOT\x26navbarType\x3dBLUE\x26layoutType\x3dCLASSIC\x26searchRoot\x3dhttp://tyazmanians.blogspot.com/search\x26blogLocale\x3den_US\x26v\x3d2\x26homepageUrl\x3dhttp://tyazmanians.blogspot.com/\x26vt\x3d8987670759279455026', where: document.getElementById("navbar-iframe-container"), id: "navbar-iframe" }); } }); </script>
      

Friday, August 05, 2005

Cisco website breached, passwords reset

Security at Cisco Systems remained front and centre as the company confirmed that it had to reset all passwords to its website because of a vulnerability in the search tool at Cisco.com.
Beginning early Wednesday [US], registered users who tried to log in were greeted with a page that began "Cisco has determined that Cisco.com password protection has been compromised". The warning said that all passwords had been reset as a precaution, and then instructed users to email Cisco for their new password. Failing an answer in five minutes, users were told to call technical support.
One Cisco user who contacted TechWeb reported that he had followed those instructions, and when he hadn't received an email with his new password after 45 minutes, phoned technical support. There he said he was told that the system had suffered a "security breach" and that Cisco was working on the problem.
A Cisco spokesman wouldn't confirm or deny that a breach took place.
"A potential vulnerability was reported by a third party that could expose passwords for registered users," said Cisco's John Noh. "We researched and fixed the problem, and as a precautionary measure, reset all passwords.
"We don't believe any passwords were compromised," he added.
Calls to Cisco's toll-free technical support line were on longer-than-usual hold times due to the volume of calls from users seeking information and new passwords. Because of that, Cisco said in a security advisory posted to its website, "registered Cisco.com users may experience delays in receiving the new passwords".
Noh couldn't offer a timeline when users might receive their new passwords, but said all levels of the company were working on it "as quickly as possible".
This is the second black eye for Cisco in as many weeks. Last week, a former researcher with Internet Security Systems (ISS) spoke at the Black Hat conference and revealed new exploit techniques on existing vulnerabilities within Cisco's routers and switches. Cisco sought, and was given, an injunction to muzzle the researcher, and took a public relations beating at the hands of security researchers and analysts.
Cisco denied that the password gaffe could be traced to a Cisco product vulnerability.
"This incident does not appear to be due to a weakness in Cisco products or technologies," the company said in a statement.

dikutip dari: itnews

0 Comments:

Post a Comment

<< Home