Google security engineer Tavis Ormandy disclosed an information leakage vulnerability in Cloudfare, a US CDN service provider. In addition to affecting Uber, password management software 1password, sports bracelet company FitBit and many other companies, this leakage also involved digital currency trading platforms, including the famous foreign P network (Poloniex). Some commentators said that the Cloudflare incident was the most serious information security leak in cloud services in recent years, and its impact may exceed that of the SHA-1 collision attack. According to the latest announcement from P.com:
It is reported that Cloudfare's engineers made a fatal error in the code that caused a memory leak and leaked the user's HTTPS session for months. The Cloudflare incident may become the most serious information security leak in cloud services in recent years. The leaked information has been cached by various crawlers, and the cache may contain a large amount of plaintext username and password information. Google engineers were able to discover this vulnerability because they found sensitive information in the contents of Google cache. It is currently reported that Google engineers have to work overtime on weekends to write tools to clean up sensitive information in Google cache data. What is Two-Factor Authentication (2FA)?Two-factor authentication (2FA) is a security process where users must provide two pieces of identification before logging into their accounts. For two-factor security, one is your password and the other is a unique code generated by an authentication app installed on your smartphone. The two most popular authentication apps are Google Authenticator and Authy. Here is a brief introduction on how to install and use Google Authenticator (using Apple devices as an example). RequireTo use Google Authenticator on your iPhone, iPod Touch, or iPad, you must have iOS 5.0 or later. Additionally, to set up the app on your iPhone using a QR code, you must have an iPhone 3G or later. Download the app
Set up the app
|
Wu said author | Colin Wu Editor of this issue | ...
The size of nostrils not only affects your appear...
Physiognomy is one of the traditional physiognomy,...
Precisely because people's stereotype of men ...
If a person's nose is relatively large, it me...
If a woman has a pointed chin, then such a woman ...
Nowadays, many women are doing very well in the w...
There are many sayings about moles on the palm, b...
According to data from the indicator and analysis...
Latiao (Litecoin), known as a master of sideways ...
A person's facial features have a great impac...
We always meet some good people, bad people, and ...
As one of the most popular passive income platfor...
Everyone's face is different. Some people hav...
Reporter of this magazine/Xu Tian Published in th...