lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <BAY2-F8ZRhQdOgl4rhY00001312@hotmail.com>
From: nutcase26 at hotmail.com (Nut Case)
Subject: How the BofA ATM network got whacked by the SQL Slammer
 Worm

So which is it Lisa, did you find the entry point or did the patch fail.

Is bofa  Pronounced "Bo Fa" the only bank that seems to have suffered the 
ill fate of a bad marketing campaign.

nutty




>By late Saturday, most of the company's ATMs were back in service. The
>company located the entry point but, for security reasons, would give no
>details of how the worm got in.
>
>"Either the patch failed or we missed some servers when we applied the
>patch," Gagnon said. "Going forward we will analyze what we can do to
>make sure this doesn't happen again."
>
>_______________________________________________
>Full-Disclosure - We believe in it.
>Charter: http://lists.netsys.com/full-disclosure-charter.html


_________________________________________________________________
STOP MORE SPAM with the new MSN 8 and get 2 months FREE*  
http://join.msn.com/?page=features/junkmail


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ