ssh

Cisco Umbrella users urged to close bug

Cisco Umbrella users urged to close bug

Static SSH key lets miscreants steal admin credentials.
Richard Chirgwin Apr 22 2022 12:01PM Security
OpenSSH to remove SHA-1 as cracking cost drops

OpenSSH to remove SHA-1 as cracking cost drops

Start the switch to better algorithms.
Juha Saarinen May 29 2020 1:26PM Security
Scores of devices on Telstra vulnerable to silent data interception

Scores of devices on Telstra vulnerable to silent data interception

Digital key reuse leaves millions of network devices wide open.
Juha Saarinen Nov 27 2015 4:37PM Security
Cisco plugs default SSH key security hole

Cisco plugs default SSH key security hole

Remote attackers could connect with superuser privileges.
Adam Greenberg Jun 29 2015 6:12AM Security
Microsoft to add SSH support to PowerShell

Microsoft to add SSH support to PowerShell

Third time lucky adding Secure Shell to Windows.
Juha Saarinen Jun 4 2015 6:28AM Software
SSH inventor proposes best practice guidance

SSH inventor proposes best practice guidance

Some businesses spend 10 percent of working time on fixing SSH keys.
Dan Raywood Apr 18 2013 3:49PM Security
Passwords, SSH keys exposed on GitHub

Passwords, SSH keys exposed on GitHub

GitHub search down, but user mistakes still exposed.
Darren Pauli Jan 25 2013 3:53PM Security
FreeBSD package infrastructure compromised

FreeBSD package infrastructure compromised

Full disclosure.
Juha Saarinen Nov 19 2012 9:30AM Security
OpenSSH released, plays in sandbox

OpenSSH released, plays in sandbox

Pre-auth attacks are dead.
Darren Pauli Sep 8 2011 4:51PM Security
Apache publishes report about security breach

Apache publishes report about security breach

Claims that no users were at risk.
Dan Raywood Sep 8 2009 10:08AM Security
Apache Software Foundation site hacked

Apache Software Foundation site hacked

Suffers breach of systems.
Phil Muncaster Aug 31 2009 6:56AM Security
SSH server attacks resurface

SSH server attacks resurface

Security researchers are warning administrators to secure their servers in the wake of new Secure Shell (SSH) attacks.
Shaun Nichols Apr 20 2009 6:20AM Security
Stolen SSH keys used for attacks

Stolen SSH keys used for attacks

Linux keys harvested by hackers.
Shaun Nichols Aug 28 2008 4:01PM Security
Brute-force SSH attacks surge

Brute-force SSH attacks surge

An incident handler from SANS' Internet Storm Center has warned businesses to ensure their servers are secure as SSH attacks rose five-fold early this week
Richard Thurston May 15 2008 10:41AM Security
Review: SSH Tectia Server and Client

Review: SSH Tectia Server and Client

Many products in this test focus on securing locally stored (or local network) data via encryption techniques.
Julian Ashbourn Apr 7 2004 12:00AM Security
F-Secure secures FIPS 140-2 Level 2 certification for SSH

F-Secure secures FIPS 140-2 Level 2 certification for SSH

F-Secure says it has received FIPS 140-2 validation from the National Institute of Standards and Technology (NIST).
Steve Gold Mar 23 2004 4:46PM Security
Review: SSH Secure Shell for Workstations

Review: SSH Secure Shell for Workstations

We have looked at solutions that are purely based within the teleworker's domain, but we are also taking the view that some organizations of the larger variety may wish to impose server-based network and system security solutions on their remote users.

Jayne Parkhouse May 1 2003 12:00AM Security
Review: SSH Secure Shell for Windows Server

Review: SSH Secure Shell for Windows Server

At the heavy duty end of the market, SSH Secure Shell for Windows Server offers enough security for even the most paranoid network administrator. Already recognized as one of the most popular applications for creating secure sessions in Unix, it is now available for Windows, replacing such protocols as Telnet or FTP with a hardened connectivity solution for those businesses that require more than usual security for data transfer.

Staff Writers Mar 1 2003 12:00AM Security

Log In

  |  Forgot your password?