<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Interxect Services Limited</title>
	<atom:link href="https://www.interxect.com/tag/news/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.interxect.com</link>
	<description>Helping You Use Information Technology Productively</description>
	<lastBuildDate>Fri, 11 Apr 2014 02:39:55 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.1</generator>

<image>
	<url>https://www.interxect.com/main/wp-content/uploads/2019/08/cropped-site_icon-32x32.png</url>
	<title>Interxect Services Limited</title>
	<link>https://www.interxect.com</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">113413426</site>	<item>
		<title>The Heartbleed Bug: What is it and what to do about it Don&#039;t let it ruin your day</title>
		<link>https://www.interxect.com/the-heartbleed-bug-what-is-it-and-what-to-do-about-it/</link>
					<comments>https://www.interxect.com/the-heartbleed-bug-what-is-it-and-what-to-do-about-it/#respond</comments>
		
		<dc:creator><![CDATA[Sachin Ganpat]]></dc:creator>
		<pubDate>Fri, 11 Apr 2014 02:30:18 +0000</pubDate>
				<category><![CDATA[Articles]]></category>
		<category><![CDATA[Enterprise Networking and Security]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[alerts]]></category>
		<category><![CDATA[heartbleed bug]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">http://www.interxect.com/main/?p=964</guid>

					<description><![CDATA[The Heartbleed Bug announced on Monday 7th April has far reaching effects. See what it is about and what you can do about it.]]></description>
										<content:encoded><![CDATA[<p><img fetchpriority="high" decoding="async" class="alignleft size-medium wp-image-965" alt="heartbleed" src="https://www.interxect.com/main/wp-content/uploads/2014/04/heartbleed-247x300.png" width="247" height="300" />There is a serious bug out there that can compromise your data and you probably wouldn&#8217;t know it.<span id="more-964"></span></p>
<h2>The Bleeding Heart Bug</h2>
<p>The Heartbleed bug (CVE-2014-0160) was <a href="https://www.openssl.org/news/secadv_20140407.txt" target="_blank">publicly disclosed on Monday</a> and affects specific versions of the OpenSSL application. OpenSSL is a generally used open-source implementation of the Secure Sockets Layer (SSL) or Transport Layer Security (TLS) Cryptographic method and is used on about 66% of all public websites. The bug has been present in the software since December 2011.</p>
<p>The bug is not a weakness in SSL/TLS itself, but rather is bug in OpenSSL implementation of it that can potentially allow attackers to access the unencrypted data stored within a server&#8217;s memory. With enough data, an attacker can find out your server encryptions keys, your passwords and any other information passed over the communication. The attackers can then use the compromised keys to eavesdrop on communications, steal data directly from the services and users and to impersonate services and users.</p>
<h2>Who are vulnerable?</h2>
<p>Because of the widespread adoption of the OpenSSL software and the ability to be attacked without leaving a trace, it means that we are all vulnerable because you can&#8217;t tell if your data has been compromised.</p>
<p>Not only websites are vulnerable, as many hardware and software vendors implement use OpenSSL in their products. <a href="http://www.networkworld.com/news/2014/041014-heartbleed-cisco-juniper-280593.html" target="_blank">Cisco and Juniper has listed advisories warning of the bug in their products</a>.</p>
<h2>What should you do?</h2>
<p>All businesses, website owners and users of affected services should take action on this bug.</p>
<p><strong>Step 1: Determine if any of your servers may be affected.</strong></p>
<p>You can use the <a href="http://filippo.io/Heartbleed/" target="_blank">check script on Filippo Valsorda&#8217;s web site</a> to check your public services.</p>
<p>Check with vendors if any of your internal services may be affected.</p>
<p><a href="http://www.cnet.com/how-to/which-sites-have-patched-the-heartbleed-bug/" target="_blank">C|NET has a list of the top 100 sites around the web to determine if they have been patched or may be affected</a></p>
<p>Website owners with their sites on hosted services should check with their service provider if they have taken action on the bug and if they were ever vulnerable.</p>
<p><strong>Step 2: Patch services for which you are able to patch yourself.</strong></p>
<p>These include any owned servers or virtual servers that you use, or internal, private servers or devices.</p>
<p><strong>Step 3: Re-Key your SSL Certificates</strong></p>
<p>This involves regenerating and reinstalling the private keys on your servers. While the risk may be small, the fact that you will not know if your key was compromised, this is a recommended precautionary step.</p>
<p><strong>Step 4: Change your passwords</strong></p>
<p>It&#8217;s important that you change any passwords that you may have on any of the affected systems AFTER you have patched OpenSSL and re-keyed your certificates. Doing so before you performed the prior steps means that if your keys were compromised, an attacked would be able to discover your new passwords.</p>
<p>If you are a service user and don&#8217;t run any services yourself, find out from the provider if they were vulnerable and if they patched their services (or use the check script in Step 1).</p>
<h2>Don&#8217;t Panic</h2>
<p>While the bug is serious, it&#8217;s important to not panic. Keep a clear head and follow the steps.</p>
<p>For more information about the bug and to keep updated <a href="http://heartbleed.com/" target="_blank">check out heartbleed.com</a>.</p>
<p>Original article: <a href="https://www.interxect.com/the-heartbleed-bug-what-is-it-and-what-to-do-about-it/" rel="bookmark" title="Permanent link to 'The Heartbleed Bug: What is it and what to do about it <small class="subtitle">Don't let it ruin your day</small>'">The Heartbleed Bug: What is it and what to do about it <small class="subtitle">Don't let it ruin your day</small></a><p>&copy;2025 <a href="https://www.interxect.com">Interxect Services Limited</a>. All Rights Reserved.</p>]]></content:encoded>
					
					<wfw:commentRss>https://www.interxect.com/the-heartbleed-bug-what-is-it-and-what-to-do-about-it/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">964</post-id>	</item>
		<item>
		<title>MySQL Vulnerability Allows Attackers to Bypass Password Verification</title>
		<link>https://www.interxect.com/mysql-vulnerability-allows-attackers-to-bypass-password-verification/</link>
					<comments>https://www.interxect.com/mysql-vulnerability-allows-attackers-to-bypass-password-verification/#respond</comments>
		
		<dc:creator><![CDATA[Sachin Ganpat]]></dc:creator>
		<pubDate>Sat, 16 Jun 2012 03:51:27 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[alerts]]></category>
		<category><![CDATA[Database]]></category>
		<category><![CDATA[Drupal]]></category>
		<category><![CDATA[Joomla]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[MySQL]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Wordpress]]></category>
		<guid isPermaLink="false">http://www.interxect.com/main/?p=299</guid>

					<description><![CDATA[Security researchers have released details about a vulnerability in the MySQL server that could allow potential attackers to access MySQL databases without inputting proper authentication credentials.]]></description>
										<content:encoded><![CDATA[<p><a href="https://www.interxect.com/main/wp-content/uploads/2012/06/mysql.png"><img decoding="async" class="alignleft size-medium wp-image-361" title="mysql" src="https://www.interxect.com/main/wp-content/uploads/2012/06/mysql-300x155.png" alt="" width="300" height="155" srcset="https://www.interxect.com/main/wp-content/uploads/2012/06/mysql-300x155.png 300w, https://www.interxect.com/main/wp-content/uploads/2012/06/mysql.png 489w" sizes="(max-width: 300px) 100vw, 300px" /></a></p>
<p>Security researchers have released details about a <a title="MySQL vulnerability allows attackers to bypass password verification" href="http://www.computerworld.com/s/article/9227965/MySQL_vulnerability_allows_attackers_to_bypass_password_verification" target="_blank">vulnerability in the MySQL server</a> that could allow potential attackers to access MySQL databases without inputting proper authentication credentials.</p>
<p>The vulnerability occurs only on *NIX based systems and Microsoft Windows systems are not affected by this vulnerability.</p>
<p><span id="more-299"></span>No official patch is available for MySQL 5.0.x, because that version of thedatabase server is no longer supported by Oracle. However, some Linux vendors might backport the patch from MySQL 5.1 or 5.5. This also affects people with personal blogs on private Linux hosts that use MySQL back-ends for web applications such as WordPress, Joomla and Drupal.</p>
<p>Any Internet accessible MySQL database is extremely vulnerable, and those in <a title="Expect A Surge In Breaches Following MySQL Vulnerability" href="http://www.darkreading.com/database-security/167901020/security/vulnerabilities/240001958/expect-a-surge-in-breaches-following-mysql-vulnerability.html" target="_blank">security circles are warning of a wave of attacks</a>. To reduce the risk, configure your MySQL databases to accept connections from only authorised IP addresses and try not to allow any public IPs access to the databases.</p>
<p>Original article: <a href="https://www.interxect.com/mysql-vulnerability-allows-attackers-to-bypass-password-verification/" rel="bookmark" title="Permanent link to 'MySQL Vulnerability Allows Attackers to Bypass Password Verification'">MySQL Vulnerability Allows Attackers to Bypass Password Verification</a><p>&copy;2025 <a href="https://www.interxect.com">Interxect Services Limited</a>. All Rights Reserved.</p>]]></content:encoded>
					
					<wfw:commentRss>https://www.interxect.com/mysql-vulnerability-allows-attackers-to-bypass-password-verification/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">299</post-id>	</item>
		<item>
		<title>Website Launched!</title>
		<link>https://www.interxect.com/website-launched-2/</link>
					<comments>https://www.interxect.com/website-launched-2/#respond</comments>
		
		<dc:creator><![CDATA[Sachin Ganpat]]></dc:creator>
		<pubDate>Thu, 13 Oct 2011 02:51:27 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Business]]></category>
		<category><![CDATA[Website]]></category>
		<guid isPermaLink="false">http://www.interxect.com/main/2011/10/website-launched-2/</guid>

					<description><![CDATA[After many months in development, Interxect Services has finally launched our website and we could finally get rid of that &#8220;Coming Soon&#8221; page. We really like the layout and hope you do to. There is still more to come, such as articles and whitepapers, so check back regularly. Please sign up for our newsletter so [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><a href="https://www.interxect.com/main/wp-content/uploads/2011/10/website.jpg"><img decoding="async" class="size-thumbnail wp-image-143 alignleft" title="Globe" src="https://www.interxect.com/main/wp-content/uploads/2011/10/website-150x150.jpg" alt="Globe" width="150" height="150" srcset="https://www.interxect.com/main/wp-content/uploads/2011/10/website-150x150.jpg 150w, https://www.interxect.com/main/wp-content/uploads/2011/10/website-65x65.jpg 65w" sizes="(max-width: 150px) 100vw, 150px" /></a></p>
<p>After many months in development, Interxect Services has finally launched our website and we could finally get rid of that &#8220;Coming Soon&#8221; page. We really like the layout and hope you do to.</p>
<p>There is still more to come, such as articles and whitepapers, so check back regularly. Please sign up for our newsletter so that you may be updated on new and interesting developments that may benefit you.</p>
<p>Feel free to contact us to let us know what you think.</p>
<p>Original article: <a href="https://www.interxect.com/website-launched-2/" rel="bookmark" title="Permanent link to 'Website Launched!'">Website Launched!</a><p>&copy;2025 <a href="https://www.interxect.com">Interxect Services Limited</a>. All Rights Reserved.</p>]]></content:encoded>
					
					<wfw:commentRss>https://www.interxect.com/website-launched-2/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">136</post-id>	</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/

Page Caching using Disk: Enhanced 
Database Caching 36/48 queries in 0.010 seconds using Disk

Served from: www.interxect.com @ 2025-06-24 16:08:43 by W3 Total Cache
-->